input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<134>Original Address=12.252.40.210 1 1660778293.679376795 M38_MX67C_Conyers flows src=99.164.1.152 dst=148.238.21.158 protocol=tcp sport=54855 dport=25565 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 25565, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=12.252.40.210 1 1660778293.679376795 M38_MX67C_Conyers flows src=99.164.1.152 dst=148.238.21.158 protocol=tcp sport=54855 dport=25565 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 54855, "protocol": 6, "streamName": "meraki", "clientIP": "99.164.1.152", "serverIP": "148.238.21.158" }
Create a JSON artifact from the message
<134>Original Address=12.252.40.210 1 1660778293.679376795 M38_MX67C_Conyers flows src=99.164.1.152 dst=148.238.21.158 protocol=tcp sport=54855 dport=25565 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=12.252.40.210 1 1660778293.679376795 M38_MX67C_Conyers flows src=99.164.1.152 dst=148.238.21.158 protocol=tcp sport=54855 dport=25565 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25565 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 54855 protocol: 6 streamName: meraki clientIP: 99.164.1.152 serverIP: 148.238.21.158
Explain this syslog message
<134>Original Address=12.252.40.210 1 1660778293.679376795 M38_MX67C_Conyers flows src=86.170.135.89 dst=212.26.170.220 protocol=tcp sport=54855 dport=25565 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 25565, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=12.252.40.210 1 1660778293.679376795 M38_MX67C_Conyers flows src=86.170.135.89 dst=212.26.170.220 protocol=tcp sport=54855 dport=25565 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 54855, "protocol": 6, "streamName": "meraki", "clientIP": "86.170.135.89", "serverIP": "212.26.170.220" }
Create a JSON artifact from the message
<134>Original Address=12.252.40.210 1 1660778293.679376795 M38_MX67C_Conyers flows src=86.170.135.89 dst=212.26.170.220 protocol=tcp sport=54855 dport=25565 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=12.252.40.210 1 1660778293.679376795 M38_MX67C_Conyers flows src=86.170.135.89 dst=212.26.170.220 protocol=tcp sport=54855 dport=25565 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25565 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 54855 protocol: 6 streamName: meraki clientIP: 86.170.135.89 serverIP: 212.26.170.220
Explain this syslog message
<134>Original Address=12.252.40.210 1 1660778293.679376795 M38_MX67C_Conyers flows src=172.38.29.53 dst=248.40.94.223 protocol=tcp sport=54855 dport=25565 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 25565, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=12.252.40.210 1 1660778293.679376795 M38_MX67C_Conyers flows src=172.38.29.53 dst=248.40.94.223 protocol=tcp sport=54855 dport=25565 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 54855, "protocol": 6, "streamName": "meraki", "clientIP": "172.38.29.53", "serverIP": "248.40.94.223" }
Create a JSON artifact from the message
<134>Original Address=12.252.40.210 1 1660778293.679376795 M38_MX67C_Conyers flows src=172.38.29.53 dst=248.40.94.223 protocol=tcp sport=54855 dport=25565 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=12.252.40.210 1 1660778293.679376795 M38_MX67C_Conyers flows src=172.38.29.53 dst=248.40.94.223 protocol=tcp sport=54855 dport=25565 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25565 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 54855 protocol: 6 streamName: meraki clientIP: 172.38.29.53 serverIP: 248.40.94.223
Explain this syslog message
<134>Original Address=12.252.40.210 1 1660778293.679376795 M38_MX67C_Conyers flows src=81.51.218.102 dst=166.136.233.48 protocol=tcp sport=54855 dport=25565 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 25565, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=12.252.40.210 1 1660778293.679376795 M38_MX67C_Conyers flows src=81.51.218.102 dst=166.136.233.48 protocol=tcp sport=54855 dport=25565 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 54855, "protocol": 6, "streamName": "meraki", "clientIP": "81.51.218.102", "serverIP": "166.136.233.48" }
Create a JSON artifact from the message
<134>Original Address=12.252.40.210 1 1660778293.679376795 M38_MX67C_Conyers flows src=81.51.218.102 dst=166.136.233.48 protocol=tcp sport=54855 dport=25565 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=12.252.40.210 1 1660778293.679376795 M38_MX67C_Conyers flows src=81.51.218.102 dst=166.136.233.48 protocol=tcp sport=54855 dport=25565 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25565 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 54855 protocol: 6 streamName: meraki clientIP: 81.51.218.102 serverIP: 166.136.233.48
Explain this syslog message
<134>Original Address=24.216.133.2 1 1660779150.396399473 M36_MX67C_Athens flows src=145.68.172.111 dst=225.148.83.61 protocol=tcp sport=56901 dport=30139 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 30139, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=24.216.133.2 1 1660779150.396399473 M36_MX67C_Athens flows src=145.68.172.111 dst=225.148.83.61 protocol=tcp sport=56901 dport=30139 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 56901, "protocol": 6, "streamName": "meraki", "clientIP": "145.68.172.111", "serverIP": "225.148.83.61" }
Create a JSON artifact from the message
<134>Original Address=24.216.133.2 1 1660779150.396399473 M36_MX67C_Athens flows src=145.68.172.111 dst=225.148.83.61 protocol=tcp sport=56901 dport=30139 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=24.216.133.2 1 1660779150.396399473 M36_MX67C_Athens flows src=145.68.172.111 dst=225.148.83.61 protocol=tcp sport=56901 dport=30139 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 30139 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 56901 protocol: 6 streamName: meraki clientIP: 145.68.172.111 serverIP: 225.148.83.61
Explain this syslog message
<134>Original Address=24.216.133.2 1 1660779150.396399473 M36_MX67C_Athens flows src=114.251.127.63 dst=74.114.26.203 protocol=tcp sport=56901 dport=30139 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 30139, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=24.216.133.2 1 1660779150.396399473 M36_MX67C_Athens flows src=114.251.127.63 dst=74.114.26.203 protocol=tcp sport=56901 dport=30139 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 56901, "protocol": 6, "streamName": "meraki", "clientIP": "114.251.127.63", "serverIP": "74.114.26.203" }
Create a JSON artifact from the message
<134>Original Address=24.216.133.2 1 1660779150.396399473 M36_MX67C_Athens flows src=114.251.127.63 dst=74.114.26.203 protocol=tcp sport=56901 dport=30139 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=24.216.133.2 1 1660779150.396399473 M36_MX67C_Athens flows src=114.251.127.63 dst=74.114.26.203 protocol=tcp sport=56901 dport=30139 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 30139 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 56901 protocol: 6 streamName: meraki clientIP: 114.251.127.63 serverIP: 74.114.26.203
Explain this syslog message
<134>Original Address=24.216.133.2 1 1660779150.396399473 M36_MX67C_Athens flows src=203.41.163.208 dst=43.5.52.0 protocol=tcp sport=56901 dport=30139 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 30139, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=24.216.133.2 1 1660779150.396399473 M36_MX67C_Athens flows src=203.41.163.208 dst=43.5.52.0 protocol=tcp sport=56901 dport=30139 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 56901, "protocol": 6, "streamName": "meraki", "clientIP": "203.41.163.208", "serverIP": "43.5.52.0" }
Create a JSON artifact from the message
<134>Original Address=24.216.133.2 1 1660779150.396399473 M36_MX67C_Athens flows src=203.41.163.208 dst=43.5.52.0 protocol=tcp sport=56901 dport=30139 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=24.216.133.2 1 1660779150.396399473 M36_MX67C_Athens flows src=203.41.163.208 dst=43.5.52.0 protocol=tcp sport=56901 dport=30139 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 30139 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 56901 protocol: 6 streamName: meraki clientIP: 203.41.163.208 serverIP: 43.5.52.0
Explain this syslog message
<134>Original Address=24.216.133.2 1 1660779150.396399473 M36_MX67C_Athens flows src=189.224.127.16 dst=175.119.253.55 protocol=tcp sport=56901 dport=30139 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 30139, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=24.216.133.2 1 1660779150.396399473 M36_MX67C_Athens flows src=189.224.127.16 dst=175.119.253.55 protocol=tcp sport=56901 dport=30139 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 56901, "protocol": 6, "streamName": "meraki", "clientIP": "189.224.127.16", "serverIP": "175.119.253.55" }
Create a JSON artifact from the message
<134>Original Address=24.216.133.2 1 1660779150.396399473 M36_MX67C_Athens flows src=189.224.127.16 dst=175.119.253.55 protocol=tcp sport=56901 dport=30139 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=24.216.133.2 1 1660779150.396399473 M36_MX67C_Athens flows src=189.224.127.16 dst=175.119.253.55 protocol=tcp sport=56901 dport=30139 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 30139 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 56901 protocol: 6 streamName: meraki clientIP: 189.224.127.16 serverIP: 175.119.253.55
Explain this syslog message
<134>Original Address=24.216.133.2 1 1660779130.508155753 M36_MX67C_Athens flows src=167.78.151.180 dst=80.90.255.64 protocol=udp sport=57009 dport=8080 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 8080, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=24.216.133.2 1 1660779130.508155753 M36_MX67C_Athens flows src=167.78.151.180 dst=80.90.255.64 protocol=udp sport=57009 dport=8080 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 57009, "protocol": 17, "streamName": "meraki", "clientIP": "167.78.151.180", "serverIP": "80.90.255.64" }
Create a JSON artifact from the message
<134>Original Address=24.216.133.2 1 1660779130.508155753 M36_MX67C_Athens flows src=167.78.151.180 dst=80.90.255.64 protocol=udp sport=57009 dport=8080 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=24.216.133.2 1 1660779130.508155753 M36_MX67C_Athens flows src=167.78.151.180 dst=80.90.255.64 protocol=udp sport=57009 dport=8080 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 8080 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 57009 protocol: 17 streamName: meraki clientIP: 167.78.151.180 serverIP: 80.90.255.64
Explain this syslog message
<134>Original Address=24.216.133.2 1 1660779130.508155753 M36_MX67C_Athens flows src=182.254.151.247 dst=199.72.222.71 protocol=udp sport=57009 dport=8080 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 8080, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=24.216.133.2 1 1660779130.508155753 M36_MX67C_Athens flows src=182.254.151.247 dst=199.72.222.71 protocol=udp sport=57009 dport=8080 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 57009, "protocol": 17, "streamName": "meraki", "clientIP": "182.254.151.247", "serverIP": "199.72.222.71" }
Create a JSON artifact from the message
<134>Original Address=24.216.133.2 1 1660779130.508155753 M36_MX67C_Athens flows src=182.254.151.247 dst=199.72.222.71 protocol=udp sport=57009 dport=8080 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=24.216.133.2 1 1660779130.508155753 M36_MX67C_Athens flows src=182.254.151.247 dst=199.72.222.71 protocol=udp sport=57009 dport=8080 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 8080 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 57009 protocol: 17 streamName: meraki clientIP: 182.254.151.247 serverIP: 199.72.222.71
Explain this syslog message
<134>Original Address=24.216.133.2 1 1660779130.508155753 M36_MX67C_Athens flows src=75.89.147.91 dst=157.239.210.105 protocol=udp sport=57009 dport=8080 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 8080, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=24.216.133.2 1 1660779130.508155753 M36_MX67C_Athens flows src=75.89.147.91 dst=157.239.210.105 protocol=udp sport=57009 dport=8080 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 57009, "protocol": 17, "streamName": "meraki", "clientIP": "75.89.147.91", "serverIP": "157.239.210.105" }
Create a JSON artifact from the message
<134>Original Address=24.216.133.2 1 1660779130.508155753 M36_MX67C_Athens flows src=75.89.147.91 dst=157.239.210.105 protocol=udp sport=57009 dport=8080 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=24.216.133.2 1 1660779130.508155753 M36_MX67C_Athens flows src=75.89.147.91 dst=157.239.210.105 protocol=udp sport=57009 dport=8080 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 8080 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 57009 protocol: 17 streamName: meraki clientIP: 75.89.147.91 serverIP: 157.239.210.105
Explain this syslog message
<134>Original Address=24.216.133.2 1 1660779130.508155753 M36_MX67C_Athens flows src=148.197.181.55 dst=244.50.246.197 protocol=udp sport=57009 dport=8080 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 8080, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=24.216.133.2 1 1660779130.508155753 M36_MX67C_Athens flows src=148.197.181.55 dst=244.50.246.197 protocol=udp sport=57009 dport=8080 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 57009, "protocol": 17, "streamName": "meraki", "clientIP": "148.197.181.55", "serverIP": "244.50.246.197" }
Create a JSON artifact from the message
<134>Original Address=24.216.133.2 1 1660779130.508155753 M36_MX67C_Athens flows src=148.197.181.55 dst=244.50.246.197 protocol=udp sport=57009 dport=8080 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=24.216.133.2 1 1660779130.508155753 M36_MX67C_Athens flows src=148.197.181.55 dst=244.50.246.197 protocol=udp sport=57009 dport=8080 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 8080 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 57009 protocol: 17 streamName: meraki clientIP: 148.197.181.55 serverIP: 244.50.246.197
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660747106.686302148 NORDC_MX400_1 flows src=190.232.162.230 dst=223.90.49.144 protocol=tcp sport=54738 dport=22 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 22, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660747106.686302148 NORDC_MX400_1 flows src=190.232.162.230 dst=223.90.49.144 protocol=tcp sport=54738 dport=22 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 54738, "protocol": 6, "streamName": "meraki", "clientIP": "190.232.162.230", "serverIP": "223.90.49.144" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660747106.686302148 NORDC_MX400_1 flows src=190.232.162.230 dst=223.90.49.144 protocol=tcp sport=54738 dport=22 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660747106.686302148 NORDC_MX400_1 flows src=190.232.162.230 dst=223.90.49.144 protocol=tcp sport=54738 dport=22 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 22 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 54738 protocol: 6 streamName: meraki clientIP: 190.232.162.230 serverIP: 223.90.49.144
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660747106.686302148 NORDC_MX400_1 flows src=78.103.72.48 dst=150.158.185.152 protocol=tcp sport=54738 dport=22 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 22, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660747106.686302148 NORDC_MX400_1 flows src=78.103.72.48 dst=150.158.185.152 protocol=tcp sport=54738 dport=22 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 54738, "protocol": 6, "streamName": "meraki", "clientIP": "78.103.72.48", "serverIP": "150.158.185.152" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660747106.686302148 NORDC_MX400_1 flows src=78.103.72.48 dst=150.158.185.152 protocol=tcp sport=54738 dport=22 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660747106.686302148 NORDC_MX400_1 flows src=78.103.72.48 dst=150.158.185.152 protocol=tcp sport=54738 dport=22 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 22 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 54738 protocol: 6 streamName: meraki clientIP: 78.103.72.48 serverIP: 150.158.185.152
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660747106.686302148 NORDC_MX400_1 flows src=166.66.213.175 dst=107.157.184.73 protocol=tcp sport=54738 dport=22 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 22, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660747106.686302148 NORDC_MX400_1 flows src=166.66.213.175 dst=107.157.184.73 protocol=tcp sport=54738 dport=22 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 54738, "protocol": 6, "streamName": "meraki", "clientIP": "166.66.213.175", "serverIP": "107.157.184.73" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660747106.686302148 NORDC_MX400_1 flows src=166.66.213.175 dst=107.157.184.73 protocol=tcp sport=54738 dport=22 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660747106.686302148 NORDC_MX400_1 flows src=166.66.213.175 dst=107.157.184.73 protocol=tcp sport=54738 dport=22 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 22 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 54738 protocol: 6 streamName: meraki clientIP: 166.66.213.175 serverIP: 107.157.184.73
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660747106.686302148 NORDC_MX400_1 flows src=36.97.43.163 dst=72.46.132.217 protocol=tcp sport=54738 dport=22 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 22, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660747106.686302148 NORDC_MX400_1 flows src=36.97.43.163 dst=72.46.132.217 protocol=tcp sport=54738 dport=22 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 54738, "protocol": 6, "streamName": "meraki", "clientIP": "36.97.43.163", "serverIP": "72.46.132.217" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660747106.686302148 NORDC_MX400_1 flows src=36.97.43.163 dst=72.46.132.217 protocol=tcp sport=54738 dport=22 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660747106.686302148 NORDC_MX400_1 flows src=36.97.43.163 dst=72.46.132.217 protocol=tcp sport=54738 dport=22 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 22 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 54738 protocol: 6 streamName: meraki clientIP: 36.97.43.163 serverIP: 72.46.132.217
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660779160.194654260 NORDC_MX400_1 flows src=203.91.225.244 dst=75.32.213.56 protocol=tcp sport=56901 dport=29870 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 29870, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660779160.194654260 NORDC_MX400_1 flows src=203.91.225.244 dst=75.32.213.56 protocol=tcp sport=56901 dport=29870 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 56901, "protocol": 6, "streamName": "meraki", "clientIP": "203.91.225.244", "serverIP": "75.32.213.56" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660779160.194654260 NORDC_MX400_1 flows src=203.91.225.244 dst=75.32.213.56 protocol=tcp sport=56901 dport=29870 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660779160.194654260 NORDC_MX400_1 flows src=203.91.225.244 dst=75.32.213.56 protocol=tcp sport=56901 dport=29870 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 29870 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 56901 protocol: 6 streamName: meraki clientIP: 203.91.225.244 serverIP: 75.32.213.56
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660779160.194654260 NORDC_MX400_1 flows src=76.137.95.137 dst=27.23.126.82 protocol=tcp sport=56901 dport=29870 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 29870, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660779160.194654260 NORDC_MX400_1 flows src=76.137.95.137 dst=27.23.126.82 protocol=tcp sport=56901 dport=29870 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 56901, "protocol": 6, "streamName": "meraki", "clientIP": "76.137.95.137", "serverIP": "27.23.126.82" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660779160.194654260 NORDC_MX400_1 flows src=76.137.95.137 dst=27.23.126.82 protocol=tcp sport=56901 dport=29870 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660779160.194654260 NORDC_MX400_1 flows src=76.137.95.137 dst=27.23.126.82 protocol=tcp sport=56901 dport=29870 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 29870 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 56901 protocol: 6 streamName: meraki clientIP: 76.137.95.137 serverIP: 27.23.126.82
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660779160.194654260 NORDC_MX400_1 flows src=92.99.233.243 dst=146.53.197.183 protocol=tcp sport=56901 dport=29870 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 29870, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660779160.194654260 NORDC_MX400_1 flows src=92.99.233.243 dst=146.53.197.183 protocol=tcp sport=56901 dport=29870 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 56901, "protocol": 6, "streamName": "meraki", "clientIP": "92.99.233.243", "serverIP": "146.53.197.183" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660779160.194654260 NORDC_MX400_1 flows src=92.99.233.243 dst=146.53.197.183 protocol=tcp sport=56901 dport=29870 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660779160.194654260 NORDC_MX400_1 flows src=92.99.233.243 dst=146.53.197.183 protocol=tcp sport=56901 dport=29870 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 29870 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 56901 protocol: 6 streamName: meraki clientIP: 92.99.233.243 serverIP: 146.53.197.183
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660779160.194654260 NORDC_MX400_1 flows src=136.168.208.183 dst=87.230.153.160 protocol=tcp sport=56901 dport=29870 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 29870, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660779160.194654260 NORDC_MX400_1 flows src=136.168.208.183 dst=87.230.153.160 protocol=tcp sport=56901 dport=29870 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 56901, "protocol": 6, "streamName": "meraki", "clientIP": "136.168.208.183", "serverIP": "87.230.153.160" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660779160.194654260 NORDC_MX400_1 flows src=136.168.208.183 dst=87.230.153.160 protocol=tcp sport=56901 dport=29870 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660779160.194654260 NORDC_MX400_1 flows src=136.168.208.183 dst=87.230.153.160 protocol=tcp sport=56901 dport=29870 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 29870 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 56901 protocol: 6 streamName: meraki clientIP: 136.168.208.183 serverIP: 87.230.153.160
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658148311.584418348 NORDC_MX400_1 flows src=125.225.3.141 dst=71.255.11.68 protocol=tcp sport=51717 dport=80 pattern: 1 dst 71.255.11.68
{ "senderhost": "192.168.2.250", "serverport": 80, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658148311.584418348 NORDC_MX400_1 flows src=125.225.3.141 dst=71.255.11.68 protocol=tcp sport=51717 dport=80 pattern: 1 dst 71.255.11.68", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 51717, "protocol": 6, "streamName": "meraki", "clientIP": "125.225.3.141", "serverIP": "71.255.11.68" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658148311.584418348 NORDC_MX400_1 flows src=125.225.3.141 dst=71.255.11.68 protocol=tcp sport=51717 dport=80 pattern: 1 dst 71.255.11.68
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658148311.584418348 NORDC_MX400_1 flows src=125.225.3.141 dst=71.255.11.68 protocol=tcp sport=51717 dport=80 pattern: 1 dst 71.255.11.68
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 80 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 51717 protocol: 6 streamName: meraki clientIP: 125.225.3.141 serverIP: 71.255.11.68
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658148311.584418348 NORDC_MX400_1 flows src=86.165.80.235 dst=108.66.172.162 protocol=tcp sport=51717 dport=80 pattern: 1 dst 108.66.172.162
{ "senderhost": "192.168.2.250", "serverport": 80, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658148311.584418348 NORDC_MX400_1 flows src=86.165.80.235 dst=108.66.172.162 protocol=tcp sport=51717 dport=80 pattern: 1 dst 108.66.172.162", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 51717, "protocol": 6, "streamName": "meraki", "clientIP": "86.165.80.235", "serverIP": "108.66.172.162" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658148311.584418348 NORDC_MX400_1 flows src=86.165.80.235 dst=108.66.172.162 protocol=tcp sport=51717 dport=80 pattern: 1 dst 108.66.172.162
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658148311.584418348 NORDC_MX400_1 flows src=86.165.80.235 dst=108.66.172.162 protocol=tcp sport=51717 dport=80 pattern: 1 dst 108.66.172.162
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 80 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 51717 protocol: 6 streamName: meraki clientIP: 86.165.80.235 serverIP: 108.66.172.162
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658148311.179202012 NORDC_MX400_1 flows src=10.138.132.241 dst=48.1.193.135 protocol=tcp sport=6250 dport=25 pattern: 1 dst 48.1.193.135
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658148311.179202012 NORDC_MX400_1 flows src=10.138.132.241 dst=48.1.193.135 protocol=tcp sport=6250 dport=25 pattern: 1 dst 48.1.193.135", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 6250, "protocol": 6, "streamName": "meraki", "clientIP": "10.138.132.241", "serverIP": "48.1.193.135" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658148311.179202012 NORDC_MX400_1 flows src=10.138.132.241 dst=48.1.193.135 protocol=tcp sport=6250 dport=25 pattern: 1 dst 48.1.193.135
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658148311.179202012 NORDC_MX400_1 flows src=10.138.132.241 dst=48.1.193.135 protocol=tcp sport=6250 dport=25 pattern: 1 dst 48.1.193.135
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 6250 protocol: 6 streamName: meraki clientIP: 10.138.132.241 serverIP: 48.1.193.135
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658148311.179202012 NORDC_MX400_1 flows src=4.84.104.90 dst=230.103.172.75 protocol=tcp sport=6250 dport=25 pattern: 1 dst 230.103.172.75
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658148311.179202012 NORDC_MX400_1 flows src=4.84.104.90 dst=230.103.172.75 protocol=tcp sport=6250 dport=25 pattern: 1 dst 230.103.172.75", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 6250, "protocol": 6, "streamName": "meraki", "clientIP": "4.84.104.90", "serverIP": "230.103.172.75" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658148311.179202012 NORDC_MX400_1 flows src=4.84.104.90 dst=230.103.172.75 protocol=tcp sport=6250 dport=25 pattern: 1 dst 230.103.172.75
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658148311.179202012 NORDC_MX400_1 flows src=4.84.104.90 dst=230.103.172.75 protocol=tcp sport=6250 dport=25 pattern: 1 dst 230.103.172.75
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 6250 protocol: 6 streamName: meraki clientIP: 4.84.104.90 serverIP: 230.103.172.75
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658148310.897311162 NORDC_MX400_1 flows src=141.48.201.74 dst=223.221.109.194 protocol=tcp sport=63122 dport=80 pattern: 1 dst 223.221.109.194
{ "senderhost": "192.168.2.250", "serverport": 80, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658148310.897311162 NORDC_MX400_1 flows src=141.48.201.74 dst=223.221.109.194 protocol=tcp sport=63122 dport=80 pattern: 1 dst 223.221.109.194", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 63122, "protocol": 6, "streamName": "meraki", "clientIP": "141.48.201.74", "serverIP": "223.221.109.194" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658148310.897311162 NORDC_MX400_1 flows src=141.48.201.74 dst=223.221.109.194 protocol=tcp sport=63122 dport=80 pattern: 1 dst 223.221.109.194
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658148310.897311162 NORDC_MX400_1 flows src=141.48.201.74 dst=223.221.109.194 protocol=tcp sport=63122 dport=80 pattern: 1 dst 223.221.109.194
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 80 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 63122 protocol: 6 streamName: meraki clientIP: 141.48.201.74 serverIP: 223.221.109.194
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658148310.897311162 NORDC_MX400_1 flows src=187.32.100.253 dst=134.28.127.18 protocol=tcp sport=63122 dport=80 pattern: 1 dst 134.28.127.18
{ "senderhost": "192.168.2.250", "serverport": 80, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658148310.897311162 NORDC_MX400_1 flows src=187.32.100.253 dst=134.28.127.18 protocol=tcp sport=63122 dport=80 pattern: 1 dst 134.28.127.18", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 63122, "protocol": 6, "streamName": "meraki", "clientIP": "187.32.100.253", "serverIP": "134.28.127.18" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658148310.897311162 NORDC_MX400_1 flows src=187.32.100.253 dst=134.28.127.18 protocol=tcp sport=63122 dport=80 pattern: 1 dst 134.28.127.18
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658148310.897311162 NORDC_MX400_1 flows src=187.32.100.253 dst=134.28.127.18 protocol=tcp sport=63122 dport=80 pattern: 1 dst 134.28.127.18
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 80 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 63122 protocol: 6 streamName: meraki clientIP: 187.32.100.253 serverIP: 134.28.127.18
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658148311.003114314 NORDC_MX400_1 flows src=181.35.198.78 dst=237.50.55.35 protocol=tcp sport=6253 dport=25 pattern: 1 dst 237.50.55.35
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658148311.003114314 NORDC_MX400_1 flows src=181.35.198.78 dst=237.50.55.35 protocol=tcp sport=6253 dport=25 pattern: 1 dst 237.50.55.35", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 6253, "protocol": 6, "streamName": "meraki", "clientIP": "181.35.198.78", "serverIP": "237.50.55.35" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658148311.003114314 NORDC_MX400_1 flows src=181.35.198.78 dst=237.50.55.35 protocol=tcp sport=6253 dport=25 pattern: 1 dst 237.50.55.35
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658148311.003114314 NORDC_MX400_1 flows src=181.35.198.78 dst=237.50.55.35 protocol=tcp sport=6253 dport=25 pattern: 1 dst 237.50.55.35
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 6253 protocol: 6 streamName: meraki clientIP: 181.35.198.78 serverIP: 237.50.55.35
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658148311.003114314 NORDC_MX400_1 flows src=32.13.18.99 dst=59.177.65.21 protocol=tcp sport=6253 dport=25 pattern: 1 dst 59.177.65.21
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658148311.003114314 NORDC_MX400_1 flows src=32.13.18.99 dst=59.177.65.21 protocol=tcp sport=6253 dport=25 pattern: 1 dst 59.177.65.21", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 6253, "protocol": 6, "streamName": "meraki", "clientIP": "32.13.18.99", "serverIP": "59.177.65.21" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658148311.003114314 NORDC_MX400_1 flows src=32.13.18.99 dst=59.177.65.21 protocol=tcp sport=6253 dport=25 pattern: 1 dst 59.177.65.21
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658148311.003114314 NORDC_MX400_1 flows src=32.13.18.99 dst=59.177.65.21 protocol=tcp sport=6253 dport=25 pattern: 1 dst 59.177.65.21
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 6253 protocol: 6 streamName: meraki clientIP: 32.13.18.99 serverIP: 59.177.65.21
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658148311.569262449 NORDC_MX400_1 flows src=125.45.102.126 dst=7.184.93.26 protocol=tcp sport=53344 dport=80 pattern: 1 dst 7.184.93.26
{ "senderhost": "192.168.2.250", "serverport": 80, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658148311.569262449 NORDC_MX400_1 flows src=125.45.102.126 dst=7.184.93.26 protocol=tcp sport=53344 dport=80 pattern: 1 dst 7.184.93.26", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 53344, "protocol": 6, "streamName": "meraki", "clientIP": "125.45.102.126", "serverIP": "7.184.93.26" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658148311.569262449 NORDC_MX400_1 flows src=125.45.102.126 dst=7.184.93.26 protocol=tcp sport=53344 dport=80 pattern: 1 dst 7.184.93.26
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658148311.569262449 NORDC_MX400_1 flows src=125.45.102.126 dst=7.184.93.26 protocol=tcp sport=53344 dport=80 pattern: 1 dst 7.184.93.26
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 80 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 53344 protocol: 6 streamName: meraki clientIP: 125.45.102.126 serverIP: 7.184.93.26
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658148311.569262449 NORDC_MX400_1 flows src=90.6.121.76 dst=238.50.195.108 protocol=tcp sport=53344 dport=80 pattern: 1 dst 238.50.195.108
{ "senderhost": "192.168.2.250", "serverport": 80, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658148311.569262449 NORDC_MX400_1 flows src=90.6.121.76 dst=238.50.195.108 protocol=tcp sport=53344 dport=80 pattern: 1 dst 238.50.195.108", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 53344, "protocol": 6, "streamName": "meraki", "clientIP": "90.6.121.76", "serverIP": "238.50.195.108" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658148311.569262449 NORDC_MX400_1 flows src=90.6.121.76 dst=238.50.195.108 protocol=tcp sport=53344 dport=80 pattern: 1 dst 238.50.195.108
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658148311.569262449 NORDC_MX400_1 flows src=90.6.121.76 dst=238.50.195.108 protocol=tcp sport=53344 dport=80 pattern: 1 dst 238.50.195.108
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 80 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 53344 protocol: 6 streamName: meraki clientIP: 90.6.121.76 serverIP: 238.50.195.108
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658148311.584418348 NORDC_MX400_1 flows src=126.51.83.227 dst=191.195.169.135 protocol=tcp sport=51717 dport=80 pattern: 1 dst 191.195.169.135
{ "senderhost": "192.168.2.250", "serverport": 80, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658148311.584418348 NORDC_MX400_1 flows src=126.51.83.227 dst=191.195.169.135 protocol=tcp sport=51717 dport=80 pattern: 1 dst 191.195.169.135", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 51717, "protocol": 6, "streamName": "meraki", "clientIP": "126.51.83.227", "serverIP": "191.195.169.135" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658148311.584418348 NORDC_MX400_1 flows src=126.51.83.227 dst=191.195.169.135 protocol=tcp sport=51717 dport=80 pattern: 1 dst 191.195.169.135
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658148311.584418348 NORDC_MX400_1 flows src=126.51.83.227 dst=191.195.169.135 protocol=tcp sport=51717 dport=80 pattern: 1 dst 191.195.169.135
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 80 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 51717 protocol: 6 streamName: meraki clientIP: 126.51.83.227 serverIP: 191.195.169.135
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658148311.584418348 NORDC_MX400_1 flows src=73.41.106.71 dst=222.82.92.255 protocol=tcp sport=51717 dport=80 pattern: 1 dst 222.82.92.255
{ "senderhost": "192.168.2.250", "serverport": 80, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658148311.584418348 NORDC_MX400_1 flows src=73.41.106.71 dst=222.82.92.255 protocol=tcp sport=51717 dport=80 pattern: 1 dst 222.82.92.255", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 51717, "protocol": 6, "streamName": "meraki", "clientIP": "73.41.106.71", "serverIP": "222.82.92.255" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658148311.584418348 NORDC_MX400_1 flows src=73.41.106.71 dst=222.82.92.255 protocol=tcp sport=51717 dport=80 pattern: 1 dst 222.82.92.255
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658148311.584418348 NORDC_MX400_1 flows src=73.41.106.71 dst=222.82.92.255 protocol=tcp sport=51717 dport=80 pattern: 1 dst 222.82.92.255
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 80 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 51717 protocol: 6 streamName: meraki clientIP: 73.41.106.71 serverIP: 222.82.92.255
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658148318.012769704 NORDC_MX400_1 flows src=100.137.225.190 dst=84.17.3.110 protocol=icmp type=8 pattern: 1 dst 84.17.3.110
{ "senderhost": "192.168.2.250", "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658148318.012769704 NORDC_MX400_1 flows src=100.137.225.190 dst=84.17.3.110 protocol=icmp type=8 pattern: 1 dst 84.17.3.110", "action": "block", "sensitivity": "normal", "messagetype": "flow", "protocol": 1, "streamName": "meraki", "clientIP": "100.137.225.190", "serverIP": "84.17.3.110" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658148318.012769704 NORDC_MX400_1 flows src=100.137.225.190 dst=84.17.3.110 protocol=icmp type=8 pattern: 1 dst 84.17.3.110
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658148318.012769704 NORDC_MX400_1 flows src=100.137.225.190 dst=84.17.3.110 protocol=icmp type=8 pattern: 1 dst 84.17.3.110
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow protocol: 1 streamName: meraki clientIP: 100.137.225.190 serverIP: 84.17.3.110
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658148318.012769704 NORDC_MX400_1 flows src=12.177.150.84 dst=28.216.123.100 protocol=icmp type=8 pattern: 1 dst 28.216.123.100
{ "senderhost": "192.168.2.250", "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658148318.012769704 NORDC_MX400_1 flows src=12.177.150.84 dst=28.216.123.100 protocol=icmp type=8 pattern: 1 dst 28.216.123.100", "action": "block", "sensitivity": "normal", "messagetype": "flow", "protocol": 1, "streamName": "meraki", "clientIP": "12.177.150.84", "serverIP": "28.216.123.100" }
Create a JSON artifact from the message