input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<134>Original Address=192.168.2.253 1 1658148318.012769704 NORDC_MX400_1 flows src=12.177.150.84 dst=28.216.123.100 protocol=icmp type=8 pattern: 1 dst 28.216.123.100
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1658148318.012769704 NORDC_MX400_1 flows src=12.177.150.84 dst=28.216.123.100 protocol=icmp type=8 pattern: 1 dst 28.216.123.100
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
protocol: 1
streamName: meraki
clientIP: 12.177.150.84
serverIP: 28.216.123.100
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1658148317.123228954 NORDC_MX400_1 flows src=55.240.135.184 dst=95.43.160.148 protocol=tcp sport=53116 dport=80 pattern: 1 dst 95.43.160.148
|
{
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658148317.123228954 NORDC_MX400_1 flows src=55.240.135.184 dst=95.43.160.148 protocol=tcp sport=53116 dport=80 pattern: 1 dst 95.43.160.148",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 53116,
"protocol": 6,
"streamName": "meraki",
"clientIP": "55.240.135.184",
"serverIP": "95.43.160.148"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1658148317.123228954 NORDC_MX400_1 flows src=55.240.135.184 dst=95.43.160.148 protocol=tcp sport=53116 dport=80 pattern: 1 dst 95.43.160.148
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1658148317.123228954 NORDC_MX400_1 flows src=55.240.135.184 dst=95.43.160.148 protocol=tcp sport=53116 dport=80 pattern: 1 dst 95.43.160.148
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 80
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 53116
protocol: 6
streamName: meraki
clientIP: 55.240.135.184
serverIP: 95.43.160.148
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1658148317.123228954 NORDC_MX400_1 flows src=222.150.57.223 dst=155.159.24.223 protocol=tcp sport=53116 dport=80 pattern: 1 dst 155.159.24.223
|
{
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658148317.123228954 NORDC_MX400_1 flows src=222.150.57.223 dst=155.159.24.223 protocol=tcp sport=53116 dport=80 pattern: 1 dst 155.159.24.223",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 53116,
"protocol": 6,
"streamName": "meraki",
"clientIP": "222.150.57.223",
"serverIP": "155.159.24.223"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1658148317.123228954 NORDC_MX400_1 flows src=222.150.57.223 dst=155.159.24.223 protocol=tcp sport=53116 dport=80 pattern: 1 dst 155.159.24.223
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1658148317.123228954 NORDC_MX400_1 flows src=222.150.57.223 dst=155.159.24.223 protocol=tcp sport=53116 dport=80 pattern: 1 dst 155.159.24.223
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 80
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 53116
protocol: 6
streamName: meraki
clientIP: 222.150.57.223
serverIP: 155.159.24.223
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1658148317.135592368 NORDC_MX400_1 flows src=160.167.90.149 dst=54.238.141.103 protocol=tcp sport=6568 dport=25 pattern: 1 dst 54.238.141.103
|
{
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658148317.135592368 NORDC_MX400_1 flows src=160.167.90.149 dst=54.238.141.103 protocol=tcp sport=6568 dport=25 pattern: 1 dst 54.238.141.103",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6568,
"protocol": 6,
"streamName": "meraki",
"clientIP": "160.167.90.149",
"serverIP": "54.238.141.103"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1658148317.135592368 NORDC_MX400_1 flows src=160.167.90.149 dst=54.238.141.103 protocol=tcp sport=6568 dport=25 pattern: 1 dst 54.238.141.103
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1658148317.135592368 NORDC_MX400_1 flows src=160.167.90.149 dst=54.238.141.103 protocol=tcp sport=6568 dport=25 pattern: 1 dst 54.238.141.103
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6568
protocol: 6
streamName: meraki
clientIP: 160.167.90.149
serverIP: 54.238.141.103
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1658148317.135592368 NORDC_MX400_1 flows src=65.155.186.170 dst=2.186.202.55 protocol=tcp sport=6568 dport=25 pattern: 1 dst 2.186.202.55
|
{
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658148317.135592368 NORDC_MX400_1 flows src=65.155.186.170 dst=2.186.202.55 protocol=tcp sport=6568 dport=25 pattern: 1 dst 2.186.202.55",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6568,
"protocol": 6,
"streamName": "meraki",
"clientIP": "65.155.186.170",
"serverIP": "2.186.202.55"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1658148317.135592368 NORDC_MX400_1 flows src=65.155.186.170 dst=2.186.202.55 protocol=tcp sport=6568 dport=25 pattern: 1 dst 2.186.202.55
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1658148317.135592368 NORDC_MX400_1 flows src=65.155.186.170 dst=2.186.202.55 protocol=tcp sport=6568 dport=25 pattern: 1 dst 2.186.202.55
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6568
protocol: 6
streamName: meraki
clientIP: 65.155.186.170
serverIP: 2.186.202.55
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1658148317.186762874 NORDC_MX400_1 flows src=81.79.133.112 dst=141.230.20.242 protocol=tcp sport=38053 dport=25 pattern: 1 dst 141.230.20.242
|
{
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658148317.186762874 NORDC_MX400_1 flows src=81.79.133.112 dst=141.230.20.242 protocol=tcp sport=38053 dport=25 pattern: 1 dst 141.230.20.242",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 38053,
"protocol": 6,
"streamName": "meraki",
"clientIP": "81.79.133.112",
"serverIP": "141.230.20.242"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1658148317.186762874 NORDC_MX400_1 flows src=81.79.133.112 dst=141.230.20.242 protocol=tcp sport=38053 dport=25 pattern: 1 dst 141.230.20.242
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1658148317.186762874 NORDC_MX400_1 flows src=81.79.133.112 dst=141.230.20.242 protocol=tcp sport=38053 dport=25 pattern: 1 dst 141.230.20.242
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 38053
protocol: 6
streamName: meraki
clientIP: 81.79.133.112
serverIP: 141.230.20.242
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1658148317.186762874 NORDC_MX400_1 flows src=26.45.41.74 dst=88.253.109.45 protocol=tcp sport=38053 dport=25 pattern: 1 dst 88.253.109.45
|
{
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658148317.186762874 NORDC_MX400_1 flows src=26.45.41.74 dst=88.253.109.45 protocol=tcp sport=38053 dport=25 pattern: 1 dst 88.253.109.45",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 38053,
"protocol": 6,
"streamName": "meraki",
"clientIP": "26.45.41.74",
"serverIP": "88.253.109.45"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1658148317.186762874 NORDC_MX400_1 flows src=26.45.41.74 dst=88.253.109.45 protocol=tcp sport=38053 dport=25 pattern: 1 dst 88.253.109.45
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1658148317.186762874 NORDC_MX400_1 flows src=26.45.41.74 dst=88.253.109.45 protocol=tcp sport=38053 dport=25 pattern: 1 dst 88.253.109.45
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 38053
protocol: 6
streamName: meraki
clientIP: 26.45.41.74
serverIP: 88.253.109.45
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1658148318.012769704 NORDC_MX400_1 flows src=52.91.250.46 dst=146.59.123.29 protocol=icmp type=8 pattern: 1 dst 146.59.123.29
|
{
"senderhost": "192.168.2.250",
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658148318.012769704 NORDC_MX400_1 flows src=52.91.250.46 dst=146.59.123.29 protocol=icmp type=8 pattern: 1 dst 146.59.123.29",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"protocol": 1,
"streamName": "meraki",
"clientIP": "52.91.250.46",
"serverIP": "146.59.123.29"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1658148318.012769704 NORDC_MX400_1 flows src=52.91.250.46 dst=146.59.123.29 protocol=icmp type=8 pattern: 1 dst 146.59.123.29
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1658148318.012769704 NORDC_MX400_1 flows src=52.91.250.46 dst=146.59.123.29 protocol=icmp type=8 pattern: 1 dst 146.59.123.29
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
protocol: 1
streamName: meraki
clientIP: 52.91.250.46
serverIP: 146.59.123.29
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1658148318.012769704 NORDC_MX400_1 flows src=239.45.34.22 dst=193.9.220.249 protocol=icmp type=8 pattern: 1 dst 193.9.220.249
|
{
"senderhost": "192.168.2.250",
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658148318.012769704 NORDC_MX400_1 flows src=239.45.34.22 dst=193.9.220.249 protocol=icmp type=8 pattern: 1 dst 193.9.220.249",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"protocol": 1,
"streamName": "meraki",
"clientIP": "239.45.34.22",
"serverIP": "193.9.220.249"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1658148318.012769704 NORDC_MX400_1 flows src=239.45.34.22 dst=193.9.220.249 protocol=icmp type=8 pattern: 1 dst 193.9.220.249
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1658148318.012769704 NORDC_MX400_1 flows src=239.45.34.22 dst=193.9.220.249 protocol=icmp type=8 pattern: 1 dst 193.9.220.249
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
protocol: 1
streamName: meraki
clientIP: 239.45.34.22
serverIP: 193.9.220.249
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1658148300.539089867 NORDC_MX400_1 flows src=194.248.31.62 dst=168.75.224.3 protocol=tcp sport=51280 dport=5972 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5972,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658148300.539089867 NORDC_MX400_1 flows src=194.248.31.62 dst=168.75.224.3 protocol=tcp sport=51280 dport=5972 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 51280,
"protocol": 6,
"streamName": "meraki",
"clientIP": "194.248.31.62",
"serverIP": "168.75.224.3"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1658148300.539089867 NORDC_MX400_1 flows src=194.248.31.62 dst=168.75.224.3 protocol=tcp sport=51280 dport=5972 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1658148300.539089867 NORDC_MX400_1 flows src=194.248.31.62 dst=168.75.224.3 protocol=tcp sport=51280 dport=5972 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5972
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 51280
protocol: 6
streamName: meraki
clientIP: 194.248.31.62
serverIP: 168.75.224.3
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1658148300.539089867 NORDC_MX400_1 flows src=64.15.242.233 dst=180.213.164.80 protocol=tcp sport=51280 dport=5972 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5972,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658148300.539089867 NORDC_MX400_1 flows src=64.15.242.233 dst=180.213.164.80 protocol=tcp sport=51280 dport=5972 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 51280,
"protocol": 6,
"streamName": "meraki",
"clientIP": "64.15.242.233",
"serverIP": "180.213.164.80"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1658148300.539089867 NORDC_MX400_1 flows src=64.15.242.233 dst=180.213.164.80 protocol=tcp sport=51280 dport=5972 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1658148300.539089867 NORDC_MX400_1 flows src=64.15.242.233 dst=180.213.164.80 protocol=tcp sport=51280 dport=5972 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5972
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 51280
protocol: 6
streamName: meraki
clientIP: 64.15.242.233
serverIP: 180.213.164.80
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1658148300.539089867 NORDC_MX400_1 flows src=174.55.111.153 dst=133.87.14.162 protocol=tcp sport=51280 dport=5972 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5972,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658148300.539089867 NORDC_MX400_1 flows src=174.55.111.153 dst=133.87.14.162 protocol=tcp sport=51280 dport=5972 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 51280,
"protocol": 6,
"streamName": "meraki",
"clientIP": "174.55.111.153",
"serverIP": "133.87.14.162"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1658148300.539089867 NORDC_MX400_1 flows src=174.55.111.153 dst=133.87.14.162 protocol=tcp sport=51280 dport=5972 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1658148300.539089867 NORDC_MX400_1 flows src=174.55.111.153 dst=133.87.14.162 protocol=tcp sport=51280 dport=5972 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5972
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 51280
protocol: 6
streamName: meraki
clientIP: 174.55.111.153
serverIP: 133.87.14.162
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1658148300.539089867 NORDC_MX400_1 flows src=50.248.170.72 dst=43.215.188.248 protocol=tcp sport=51280 dport=5972 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5972,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658148300.539089867 NORDC_MX400_1 flows src=50.248.170.72 dst=43.215.188.248 protocol=tcp sport=51280 dport=5972 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 51280,
"protocol": 6,
"streamName": "meraki",
"clientIP": "50.248.170.72",
"serverIP": "43.215.188.248"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1658148300.539089867 NORDC_MX400_1 flows src=50.248.170.72 dst=43.215.188.248 protocol=tcp sport=51280 dport=5972 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1658148300.539089867 NORDC_MX400_1 flows src=50.248.170.72 dst=43.215.188.248 protocol=tcp sport=51280 dport=5972 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5972
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 51280
protocol: 6
streamName: meraki
clientIP: 50.248.170.72
serverIP: 43.215.188.248
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1658148022.065083626 M61_MX67C_Savannah flows src=197.194.157.13 dst=71.112.135.252 protocol=tcp sport=48513 dport=4047 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 4047,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1658148022.065083626 M61_MX67C_Savannah flows src=197.194.157.13 dst=71.112.135.252 protocol=tcp sport=48513 dport=4047 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 48513,
"protocol": 6,
"streamName": "meraki",
"clientIP": "197.194.157.13",
"serverIP": "71.112.135.252"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1658148022.065083626 M61_MX67C_Savannah flows src=197.194.157.13 dst=71.112.135.252 protocol=tcp sport=48513 dport=4047 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1658148022.065083626 M61_MX67C_Savannah flows src=197.194.157.13 dst=71.112.135.252 protocol=tcp sport=48513 dport=4047 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 4047
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 48513
protocol: 6
streamName: meraki
clientIP: 197.194.157.13
serverIP: 71.112.135.252
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1658148022.065083626 M61_MX67C_Savannah flows src=216.126.195.80 dst=21.216.16.79 protocol=tcp sport=48513 dport=4047 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 4047,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1658148022.065083626 M61_MX67C_Savannah flows src=216.126.195.80 dst=21.216.16.79 protocol=tcp sport=48513 dport=4047 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 48513,
"protocol": 6,
"streamName": "meraki",
"clientIP": "216.126.195.80",
"serverIP": "21.216.16.79"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1658148022.065083626 M61_MX67C_Savannah flows src=216.126.195.80 dst=21.216.16.79 protocol=tcp sport=48513 dport=4047 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1658148022.065083626 M61_MX67C_Savannah flows src=216.126.195.80 dst=21.216.16.79 protocol=tcp sport=48513 dport=4047 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 4047
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 48513
protocol: 6
streamName: meraki
clientIP: 216.126.195.80
serverIP: 21.216.16.79
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1658148022.065083626 M61_MX67C_Savannah flows src=127.172.115.164 dst=76.215.27.93 protocol=tcp sport=48513 dport=4047 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 4047,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1658148022.065083626 M61_MX67C_Savannah flows src=127.172.115.164 dst=76.215.27.93 protocol=tcp sport=48513 dport=4047 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 48513,
"protocol": 6,
"streamName": "meraki",
"clientIP": "127.172.115.164",
"serverIP": "76.215.27.93"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1658148022.065083626 M61_MX67C_Savannah flows src=127.172.115.164 dst=76.215.27.93 protocol=tcp sport=48513 dport=4047 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1658148022.065083626 M61_MX67C_Savannah flows src=127.172.115.164 dst=76.215.27.93 protocol=tcp sport=48513 dport=4047 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 4047
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 48513
protocol: 6
streamName: meraki
clientIP: 127.172.115.164
serverIP: 76.215.27.93
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1658148022.065083626 M61_MX67C_Savannah flows src=91.144.194.34 dst=233.164.10.201 protocol=tcp sport=48513 dport=4047 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 4047,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1658148022.065083626 M61_MX67C_Savannah flows src=91.144.194.34 dst=233.164.10.201 protocol=tcp sport=48513 dport=4047 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 48513,
"protocol": 6,
"streamName": "meraki",
"clientIP": "91.144.194.34",
"serverIP": "233.164.10.201"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1658148022.065083626 M61_MX67C_Savannah flows src=91.144.194.34 dst=233.164.10.201 protocol=tcp sport=48513 dport=4047 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1658148022.065083626 M61_MX67C_Savannah flows src=91.144.194.34 dst=233.164.10.201 protocol=tcp sport=48513 dport=4047 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 4047
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 48513
protocol: 6
streamName: meraki
clientIP: 91.144.194.34
serverIP: 233.164.10.201
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1658148028.078943266 M61_MX67C_Savannah flows src=92.139.236.116 dst=89.159.108.233 protocol=tcp sport=47065 dport=5996 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5996,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1658148028.078943266 M61_MX67C_Savannah flows src=92.139.236.116 dst=89.159.108.233 protocol=tcp sport=47065 dport=5996 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 47065,
"protocol": 6,
"streamName": "meraki",
"clientIP": "92.139.236.116",
"serverIP": "89.159.108.233"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1658148028.078943266 M61_MX67C_Savannah flows src=92.139.236.116 dst=89.159.108.233 protocol=tcp sport=47065 dport=5996 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1658148028.078943266 M61_MX67C_Savannah flows src=92.139.236.116 dst=89.159.108.233 protocol=tcp sport=47065 dport=5996 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5996
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 47065
protocol: 6
streamName: meraki
clientIP: 92.139.236.116
serverIP: 89.159.108.233
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1658148028.078943266 M61_MX67C_Savannah flows src=164.189.167.104 dst=8.251.171.148 protocol=tcp sport=47065 dport=5996 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5996,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1658148028.078943266 M61_MX67C_Savannah flows src=164.189.167.104 dst=8.251.171.148 protocol=tcp sport=47065 dport=5996 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 47065,
"protocol": 6,
"streamName": "meraki",
"clientIP": "164.189.167.104",
"serverIP": "8.251.171.148"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1658148028.078943266 M61_MX67C_Savannah flows src=164.189.167.104 dst=8.251.171.148 protocol=tcp sport=47065 dport=5996 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1658148028.078943266 M61_MX67C_Savannah flows src=164.189.167.104 dst=8.251.171.148 protocol=tcp sport=47065 dport=5996 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5996
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 47065
protocol: 6
streamName: meraki
clientIP: 164.189.167.104
serverIP: 8.251.171.148
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1658148028.078943266 M61_MX67C_Savannah flows src=148.137.146.15 dst=180.123.115.6 protocol=tcp sport=47065 dport=5996 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5996,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1658148028.078943266 M61_MX67C_Savannah flows src=148.137.146.15 dst=180.123.115.6 protocol=tcp sport=47065 dport=5996 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 47065,
"protocol": 6,
"streamName": "meraki",
"clientIP": "148.137.146.15",
"serverIP": "180.123.115.6"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1658148028.078943266 M61_MX67C_Savannah flows src=148.137.146.15 dst=180.123.115.6 protocol=tcp sport=47065 dport=5996 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1658148028.078943266 M61_MX67C_Savannah flows src=148.137.146.15 dst=180.123.115.6 protocol=tcp sport=47065 dport=5996 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5996
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 47065
protocol: 6
streamName: meraki
clientIP: 148.137.146.15
serverIP: 180.123.115.6
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1658148028.078943266 M61_MX67C_Savannah flows src=80.198.236.240 dst=84.170.13.163 protocol=tcp sport=47065 dport=5996 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5996,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1658148028.078943266 M61_MX67C_Savannah flows src=80.198.236.240 dst=84.170.13.163 protocol=tcp sport=47065 dport=5996 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 47065,
"protocol": 6,
"streamName": "meraki",
"clientIP": "80.198.236.240",
"serverIP": "84.170.13.163"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1658148028.078943266 M61_MX67C_Savannah flows src=80.198.236.240 dst=84.170.13.163 protocol=tcp sport=47065 dport=5996 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1658148028.078943266 M61_MX67C_Savannah flows src=80.198.236.240 dst=84.170.13.163 protocol=tcp sport=47065 dport=5996 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5996
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 47065
protocol: 6
streamName: meraki
clientIP: 80.198.236.240
serverIP: 84.170.13.163
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1658148039.482242946 M61_MX67C_Savannah flows src=120.38.64.239 dst=246.133.225.110 protocol=tcp sport=47065 dport=5996 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5996,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1658148039.482242946 M61_MX67C_Savannah flows src=120.38.64.239 dst=246.133.225.110 protocol=tcp sport=47065 dport=5996 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 47065,
"protocol": 6,
"streamName": "meraki",
"clientIP": "120.38.64.239",
"serverIP": "246.133.225.110"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1658148039.482242946 M61_MX67C_Savannah flows src=120.38.64.239 dst=246.133.225.110 protocol=tcp sport=47065 dport=5996 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1658148039.482242946 M61_MX67C_Savannah flows src=120.38.64.239 dst=246.133.225.110 protocol=tcp sport=47065 dport=5996 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5996
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 47065
protocol: 6
streamName: meraki
clientIP: 120.38.64.239
serverIP: 246.133.225.110
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1658148039.482242946 M61_MX67C_Savannah flows src=216.113.7.223 dst=151.25.153.71 protocol=tcp sport=47065 dport=5996 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5996,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1658148039.482242946 M61_MX67C_Savannah flows src=216.113.7.223 dst=151.25.153.71 protocol=tcp sport=47065 dport=5996 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 47065,
"protocol": 6,
"streamName": "meraki",
"clientIP": "216.113.7.223",
"serverIP": "151.25.153.71"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1658148039.482242946 M61_MX67C_Savannah flows src=216.113.7.223 dst=151.25.153.71 protocol=tcp sport=47065 dport=5996 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1658148039.482242946 M61_MX67C_Savannah flows src=216.113.7.223 dst=151.25.153.71 protocol=tcp sport=47065 dport=5996 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5996
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 47065
protocol: 6
streamName: meraki
clientIP: 216.113.7.223
serverIP: 151.25.153.71
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1658148039.482242946 M61_MX67C_Savannah flows src=53.204.198.230 dst=227.158.123.72 protocol=tcp sport=47065 dport=5996 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5996,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1658148039.482242946 M61_MX67C_Savannah flows src=53.204.198.230 dst=227.158.123.72 protocol=tcp sport=47065 dport=5996 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 47065,
"protocol": 6,
"streamName": "meraki",
"clientIP": "53.204.198.230",
"serverIP": "227.158.123.72"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1658148039.482242946 M61_MX67C_Savannah flows src=53.204.198.230 dst=227.158.123.72 protocol=tcp sport=47065 dport=5996 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1658148039.482242946 M61_MX67C_Savannah flows src=53.204.198.230 dst=227.158.123.72 protocol=tcp sport=47065 dport=5996 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5996
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 47065
protocol: 6
streamName: meraki
clientIP: 53.204.198.230
serverIP: 227.158.123.72
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1658148039.482242946 M61_MX67C_Savannah flows src=95.121.82.38 dst=41.56.217.184 protocol=tcp sport=47065 dport=5996 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5996,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1658148039.482242946 M61_MX67C_Savannah flows src=95.121.82.38 dst=41.56.217.184 protocol=tcp sport=47065 dport=5996 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 47065,
"protocol": 6,
"streamName": "meraki",
"clientIP": "95.121.82.38",
"serverIP": "41.56.217.184"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1658148039.482242946 M61_MX67C_Savannah flows src=95.121.82.38 dst=41.56.217.184 protocol=tcp sport=47065 dport=5996 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1658148039.482242946 M61_MX67C_Savannah flows src=95.121.82.38 dst=41.56.217.184 protocol=tcp sport=47065 dport=5996 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5996
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 47065
protocol: 6
streamName: meraki
clientIP: 95.121.82.38
serverIP: 41.56.217.184
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1658148033.085257466 M61_MX67C_Savannah flows src=224.108.246.67 dst=252.47.147.106 protocol=tcp sport=39327 dport=44818 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 39327,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1658148033.085257466 M61_MX67C_Savannah flows src=224.108.246.67 dst=252.47.147.106 protocol=tcp sport=39327 dport=44818 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 44818,
"protocol": 6,
"streamName": "meraki",
"clientIP": "252.47.147.106",
"serverIP": "224.108.246.67"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1658148033.085257466 M61_MX67C_Savannah flows src=224.108.246.67 dst=252.47.147.106 protocol=tcp sport=39327 dport=44818 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1658148033.085257466 M61_MX67C_Savannah flows src=224.108.246.67 dst=252.47.147.106 protocol=tcp sport=39327 dport=44818 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 39327
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 44818
protocol: 6
streamName: meraki
clientIP: 252.47.147.106
serverIP: 224.108.246.67
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1658148033.085257466 M61_MX67C_Savannah flows src=158.196.213.138 dst=255.25.155.164 protocol=tcp sport=39327 dport=44818 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 39327,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1658148033.085257466 M61_MX67C_Savannah flows src=158.196.213.138 dst=255.25.155.164 protocol=tcp sport=39327 dport=44818 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 44818,
"protocol": 6,
"streamName": "meraki",
"clientIP": "255.25.155.164",
"serverIP": "158.196.213.138"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1658148033.085257466 M61_MX67C_Savannah flows src=158.196.213.138 dst=255.25.155.164 protocol=tcp sport=39327 dport=44818 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1658148033.085257466 M61_MX67C_Savannah flows src=158.196.213.138 dst=255.25.155.164 protocol=tcp sport=39327 dport=44818 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 39327
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 44818
protocol: 6
streamName: meraki
clientIP: 255.25.155.164
serverIP: 158.196.213.138
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1658148033.085257466 M61_MX67C_Savannah flows src=13.161.219.75 dst=93.77.20.244 protocol=tcp sport=39327 dport=44818 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 39327,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1658148033.085257466 M61_MX67C_Savannah flows src=13.161.219.75 dst=93.77.20.244 protocol=tcp sport=39327 dport=44818 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 44818,
"protocol": 6,
"streamName": "meraki",
"clientIP": "93.77.20.244",
"serverIP": "13.161.219.75"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1658148033.085257466 M61_MX67C_Savannah flows src=13.161.219.75 dst=93.77.20.244 protocol=tcp sport=39327 dport=44818 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1658148033.085257466 M61_MX67C_Savannah flows src=13.161.219.75 dst=93.77.20.244 protocol=tcp sport=39327 dport=44818 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 39327
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 44818
protocol: 6
streamName: meraki
clientIP: 93.77.20.244
serverIP: 13.161.219.75
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1658148033.085257466 M61_MX67C_Savannah flows src=69.186.105.165 dst=78.61.146.215 protocol=tcp sport=39327 dport=44818 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 39327,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1658148033.085257466 M61_MX67C_Savannah flows src=69.186.105.165 dst=78.61.146.215 protocol=tcp sport=39327 dport=44818 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 44818,
"protocol": 6,
"streamName": "meraki",
"clientIP": "78.61.146.215",
"serverIP": "69.186.105.165"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1658148033.085257466 M61_MX67C_Savannah flows src=69.186.105.165 dst=78.61.146.215 protocol=tcp sport=39327 dport=44818 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1658148033.085257466 M61_MX67C_Savannah flows src=69.186.105.165 dst=78.61.146.215 protocol=tcp sport=39327 dport=44818 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 39327
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 44818
protocol: 6
streamName: meraki
clientIP: 78.61.146.215
serverIP: 69.186.105.165
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1658148034.090233106 M61_MX67C_Savannah flows src=173.130.202.131 dst=213.144.19.253 protocol=tcp sport=47065 dport=5996 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5996,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1658148034.090233106 M61_MX67C_Savannah flows src=173.130.202.131 dst=213.144.19.253 protocol=tcp sport=47065 dport=5996 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 47065,
"protocol": 6,
"streamName": "meraki",
"clientIP": "173.130.202.131",
"serverIP": "213.144.19.253"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1658148034.090233106 M61_MX67C_Savannah flows src=173.130.202.131 dst=213.144.19.253 protocol=tcp sport=47065 dport=5996 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1658148034.090233106 M61_MX67C_Savannah flows src=173.130.202.131 dst=213.144.19.253 protocol=tcp sport=47065 dport=5996 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5996
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 47065
protocol: 6
streamName: meraki
clientIP: 173.130.202.131
serverIP: 213.144.19.253
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1658148034.090233106 M61_MX67C_Savannah flows src=225.51.232.245 dst=102.210.247.236 protocol=tcp sport=47065 dport=5996 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5996,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1658148034.090233106 M61_MX67C_Savannah flows src=225.51.232.245 dst=102.210.247.236 protocol=tcp sport=47065 dport=5996 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 47065,
"protocol": 6,
"streamName": "meraki",
"clientIP": "225.51.232.245",
"serverIP": "102.210.247.236"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1658148034.090233106 M61_MX67C_Savannah flows src=225.51.232.245 dst=102.210.247.236 protocol=tcp sport=47065 dport=5996 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1658148034.090233106 M61_MX67C_Savannah flows src=225.51.232.245 dst=102.210.247.236 protocol=tcp sport=47065 dport=5996 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5996
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 47065
protocol: 6
streamName: meraki
clientIP: 225.51.232.245
serverIP: 102.210.247.236
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1658148034.090233106 M61_MX67C_Savannah flows src=229.133.181.18 dst=27.210.30.70 protocol=tcp sport=47065 dport=5996 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5996,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1658148034.090233106 M61_MX67C_Savannah flows src=229.133.181.18 dst=27.210.30.70 protocol=tcp sport=47065 dport=5996 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 47065,
"protocol": 6,
"streamName": "meraki",
"clientIP": "229.133.181.18",
"serverIP": "27.210.30.70"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1658148034.090233106 M61_MX67C_Savannah flows src=229.133.181.18 dst=27.210.30.70 protocol=tcp sport=47065 dport=5996 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1658148034.090233106 M61_MX67C_Savannah flows src=229.133.181.18 dst=27.210.30.70 protocol=tcp sport=47065 dport=5996 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5996
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 47065
protocol: 6
streamName: meraki
clientIP: 229.133.181.18
serverIP: 27.210.30.70
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1658148034.090233106 M61_MX67C_Savannah flows src=96.71.230.187 dst=243.9.86.249 protocol=tcp sport=47065 dport=5996 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5996,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1658148034.090233106 M61_MX67C_Savannah flows src=96.71.230.187 dst=243.9.86.249 protocol=tcp sport=47065 dport=5996 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 47065,
"protocol": 6,
"streamName": "meraki",
"clientIP": "96.71.230.187",
"serverIP": "243.9.86.249"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1658148034.090233106 M61_MX67C_Savannah flows src=96.71.230.187 dst=243.9.86.249 protocol=tcp sport=47065 dport=5996 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1658148034.090233106 M61_MX67C_Savannah flows src=96.71.230.187 dst=243.9.86.249 protocol=tcp sport=47065 dport=5996 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5996
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 47065
protocol: 6
streamName: meraki
clientIP: 96.71.230.187
serverIP: 243.9.86.249
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1658148302.077111706 M61_MX67C_Savannah flows src=140.92.192.125 dst=60.254.26.6 protocol=tcp sport=53134 dport=19034 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 19034,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1658148302.077111706 M61_MX67C_Savannah flows src=140.92.192.125 dst=60.254.26.6 protocol=tcp sport=53134 dport=19034 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 53134,
"protocol": 6,
"streamName": "meraki",
"clientIP": "140.92.192.125",
"serverIP": "60.254.26.6"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1658148302.077111706 M61_MX67C_Savannah flows src=140.92.192.125 dst=60.254.26.6 protocol=tcp sport=53134 dport=19034 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.