input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<134>Original Address=192.168.2.253 1 1658148318.012769704 NORDC_MX400_1 flows src=12.177.150.84 dst=28.216.123.100 protocol=icmp type=8 pattern: 1 dst 28.216.123.100
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658148318.012769704 NORDC_MX400_1 flows src=12.177.150.84 dst=28.216.123.100 protocol=icmp type=8 pattern: 1 dst 28.216.123.100
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow protocol: 1 streamName: meraki clientIP: 12.177.150.84 serverIP: 28.216.123.100
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658148317.123228954 NORDC_MX400_1 flows src=55.240.135.184 dst=95.43.160.148 protocol=tcp sport=53116 dport=80 pattern: 1 dst 95.43.160.148
{ "senderhost": "192.168.2.250", "serverport": 80, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658148317.123228954 NORDC_MX400_1 flows src=55.240.135.184 dst=95.43.160.148 protocol=tcp sport=53116 dport=80 pattern: 1 dst 95.43.160.148", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 53116, "protocol": 6, "streamName": "meraki", "clientIP": "55.240.135.184", "serverIP": "95.43.160.148" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658148317.123228954 NORDC_MX400_1 flows src=55.240.135.184 dst=95.43.160.148 protocol=tcp sport=53116 dport=80 pattern: 1 dst 95.43.160.148
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658148317.123228954 NORDC_MX400_1 flows src=55.240.135.184 dst=95.43.160.148 protocol=tcp sport=53116 dport=80 pattern: 1 dst 95.43.160.148
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 80 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 53116 protocol: 6 streamName: meraki clientIP: 55.240.135.184 serverIP: 95.43.160.148
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658148317.123228954 NORDC_MX400_1 flows src=222.150.57.223 dst=155.159.24.223 protocol=tcp sport=53116 dport=80 pattern: 1 dst 155.159.24.223
{ "senderhost": "192.168.2.250", "serverport": 80, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658148317.123228954 NORDC_MX400_1 flows src=222.150.57.223 dst=155.159.24.223 protocol=tcp sport=53116 dport=80 pattern: 1 dst 155.159.24.223", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 53116, "protocol": 6, "streamName": "meraki", "clientIP": "222.150.57.223", "serverIP": "155.159.24.223" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658148317.123228954 NORDC_MX400_1 flows src=222.150.57.223 dst=155.159.24.223 protocol=tcp sport=53116 dport=80 pattern: 1 dst 155.159.24.223
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658148317.123228954 NORDC_MX400_1 flows src=222.150.57.223 dst=155.159.24.223 protocol=tcp sport=53116 dport=80 pattern: 1 dst 155.159.24.223
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 80 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 53116 protocol: 6 streamName: meraki clientIP: 222.150.57.223 serverIP: 155.159.24.223
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658148317.135592368 NORDC_MX400_1 flows src=160.167.90.149 dst=54.238.141.103 protocol=tcp sport=6568 dport=25 pattern: 1 dst 54.238.141.103
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658148317.135592368 NORDC_MX400_1 flows src=160.167.90.149 dst=54.238.141.103 protocol=tcp sport=6568 dport=25 pattern: 1 dst 54.238.141.103", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 6568, "protocol": 6, "streamName": "meraki", "clientIP": "160.167.90.149", "serverIP": "54.238.141.103" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658148317.135592368 NORDC_MX400_1 flows src=160.167.90.149 dst=54.238.141.103 protocol=tcp sport=6568 dport=25 pattern: 1 dst 54.238.141.103
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658148317.135592368 NORDC_MX400_1 flows src=160.167.90.149 dst=54.238.141.103 protocol=tcp sport=6568 dport=25 pattern: 1 dst 54.238.141.103
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 6568 protocol: 6 streamName: meraki clientIP: 160.167.90.149 serverIP: 54.238.141.103
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658148317.135592368 NORDC_MX400_1 flows src=65.155.186.170 dst=2.186.202.55 protocol=tcp sport=6568 dport=25 pattern: 1 dst 2.186.202.55
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658148317.135592368 NORDC_MX400_1 flows src=65.155.186.170 dst=2.186.202.55 protocol=tcp sport=6568 dport=25 pattern: 1 dst 2.186.202.55", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 6568, "protocol": 6, "streamName": "meraki", "clientIP": "65.155.186.170", "serverIP": "2.186.202.55" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658148317.135592368 NORDC_MX400_1 flows src=65.155.186.170 dst=2.186.202.55 protocol=tcp sport=6568 dport=25 pattern: 1 dst 2.186.202.55
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658148317.135592368 NORDC_MX400_1 flows src=65.155.186.170 dst=2.186.202.55 protocol=tcp sport=6568 dport=25 pattern: 1 dst 2.186.202.55
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 6568 protocol: 6 streamName: meraki clientIP: 65.155.186.170 serverIP: 2.186.202.55
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658148317.186762874 NORDC_MX400_1 flows src=81.79.133.112 dst=141.230.20.242 protocol=tcp sport=38053 dport=25 pattern: 1 dst 141.230.20.242
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658148317.186762874 NORDC_MX400_1 flows src=81.79.133.112 dst=141.230.20.242 protocol=tcp sport=38053 dport=25 pattern: 1 dst 141.230.20.242", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 38053, "protocol": 6, "streamName": "meraki", "clientIP": "81.79.133.112", "serverIP": "141.230.20.242" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658148317.186762874 NORDC_MX400_1 flows src=81.79.133.112 dst=141.230.20.242 protocol=tcp sport=38053 dport=25 pattern: 1 dst 141.230.20.242
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658148317.186762874 NORDC_MX400_1 flows src=81.79.133.112 dst=141.230.20.242 protocol=tcp sport=38053 dport=25 pattern: 1 dst 141.230.20.242
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 38053 protocol: 6 streamName: meraki clientIP: 81.79.133.112 serverIP: 141.230.20.242
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658148317.186762874 NORDC_MX400_1 flows src=26.45.41.74 dst=88.253.109.45 protocol=tcp sport=38053 dport=25 pattern: 1 dst 88.253.109.45
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658148317.186762874 NORDC_MX400_1 flows src=26.45.41.74 dst=88.253.109.45 protocol=tcp sport=38053 dport=25 pattern: 1 dst 88.253.109.45", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 38053, "protocol": 6, "streamName": "meraki", "clientIP": "26.45.41.74", "serverIP": "88.253.109.45" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658148317.186762874 NORDC_MX400_1 flows src=26.45.41.74 dst=88.253.109.45 protocol=tcp sport=38053 dport=25 pattern: 1 dst 88.253.109.45
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658148317.186762874 NORDC_MX400_1 flows src=26.45.41.74 dst=88.253.109.45 protocol=tcp sport=38053 dport=25 pattern: 1 dst 88.253.109.45
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 38053 protocol: 6 streamName: meraki clientIP: 26.45.41.74 serverIP: 88.253.109.45
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658148318.012769704 NORDC_MX400_1 flows src=52.91.250.46 dst=146.59.123.29 protocol=icmp type=8 pattern: 1 dst 146.59.123.29
{ "senderhost": "192.168.2.250", "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658148318.012769704 NORDC_MX400_1 flows src=52.91.250.46 dst=146.59.123.29 protocol=icmp type=8 pattern: 1 dst 146.59.123.29", "action": "block", "sensitivity": "normal", "messagetype": "flow", "protocol": 1, "streamName": "meraki", "clientIP": "52.91.250.46", "serverIP": "146.59.123.29" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658148318.012769704 NORDC_MX400_1 flows src=52.91.250.46 dst=146.59.123.29 protocol=icmp type=8 pattern: 1 dst 146.59.123.29
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658148318.012769704 NORDC_MX400_1 flows src=52.91.250.46 dst=146.59.123.29 protocol=icmp type=8 pattern: 1 dst 146.59.123.29
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow protocol: 1 streamName: meraki clientIP: 52.91.250.46 serverIP: 146.59.123.29
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658148318.012769704 NORDC_MX400_1 flows src=239.45.34.22 dst=193.9.220.249 protocol=icmp type=8 pattern: 1 dst 193.9.220.249
{ "senderhost": "192.168.2.250", "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658148318.012769704 NORDC_MX400_1 flows src=239.45.34.22 dst=193.9.220.249 protocol=icmp type=8 pattern: 1 dst 193.9.220.249", "action": "block", "sensitivity": "normal", "messagetype": "flow", "protocol": 1, "streamName": "meraki", "clientIP": "239.45.34.22", "serverIP": "193.9.220.249" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658148318.012769704 NORDC_MX400_1 flows src=239.45.34.22 dst=193.9.220.249 protocol=icmp type=8 pattern: 1 dst 193.9.220.249
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658148318.012769704 NORDC_MX400_1 flows src=239.45.34.22 dst=193.9.220.249 protocol=icmp type=8 pattern: 1 dst 193.9.220.249
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow protocol: 1 streamName: meraki clientIP: 239.45.34.22 serverIP: 193.9.220.249
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658148300.539089867 NORDC_MX400_1 flows src=194.248.31.62 dst=168.75.224.3 protocol=tcp sport=51280 dport=5972 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5972, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658148300.539089867 NORDC_MX400_1 flows src=194.248.31.62 dst=168.75.224.3 protocol=tcp sport=51280 dport=5972 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 51280, "protocol": 6, "streamName": "meraki", "clientIP": "194.248.31.62", "serverIP": "168.75.224.3" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658148300.539089867 NORDC_MX400_1 flows src=194.248.31.62 dst=168.75.224.3 protocol=tcp sport=51280 dport=5972 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658148300.539089867 NORDC_MX400_1 flows src=194.248.31.62 dst=168.75.224.3 protocol=tcp sport=51280 dport=5972 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5972 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 51280 protocol: 6 streamName: meraki clientIP: 194.248.31.62 serverIP: 168.75.224.3
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658148300.539089867 NORDC_MX400_1 flows src=64.15.242.233 dst=180.213.164.80 protocol=tcp sport=51280 dport=5972 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5972, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658148300.539089867 NORDC_MX400_1 flows src=64.15.242.233 dst=180.213.164.80 protocol=tcp sport=51280 dport=5972 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 51280, "protocol": 6, "streamName": "meraki", "clientIP": "64.15.242.233", "serverIP": "180.213.164.80" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658148300.539089867 NORDC_MX400_1 flows src=64.15.242.233 dst=180.213.164.80 protocol=tcp sport=51280 dport=5972 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658148300.539089867 NORDC_MX400_1 flows src=64.15.242.233 dst=180.213.164.80 protocol=tcp sport=51280 dport=5972 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5972 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 51280 protocol: 6 streamName: meraki clientIP: 64.15.242.233 serverIP: 180.213.164.80
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658148300.539089867 NORDC_MX400_1 flows src=174.55.111.153 dst=133.87.14.162 protocol=tcp sport=51280 dport=5972 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5972, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658148300.539089867 NORDC_MX400_1 flows src=174.55.111.153 dst=133.87.14.162 protocol=tcp sport=51280 dport=5972 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 51280, "protocol": 6, "streamName": "meraki", "clientIP": "174.55.111.153", "serverIP": "133.87.14.162" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658148300.539089867 NORDC_MX400_1 flows src=174.55.111.153 dst=133.87.14.162 protocol=tcp sport=51280 dport=5972 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658148300.539089867 NORDC_MX400_1 flows src=174.55.111.153 dst=133.87.14.162 protocol=tcp sport=51280 dport=5972 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5972 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 51280 protocol: 6 streamName: meraki clientIP: 174.55.111.153 serverIP: 133.87.14.162
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658148300.539089867 NORDC_MX400_1 flows src=50.248.170.72 dst=43.215.188.248 protocol=tcp sport=51280 dport=5972 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5972, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658148300.539089867 NORDC_MX400_1 flows src=50.248.170.72 dst=43.215.188.248 protocol=tcp sport=51280 dport=5972 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 51280, "protocol": 6, "streamName": "meraki", "clientIP": "50.248.170.72", "serverIP": "43.215.188.248" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658148300.539089867 NORDC_MX400_1 flows src=50.248.170.72 dst=43.215.188.248 protocol=tcp sport=51280 dport=5972 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658148300.539089867 NORDC_MX400_1 flows src=50.248.170.72 dst=43.215.188.248 protocol=tcp sport=51280 dport=5972 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5972 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 51280 protocol: 6 streamName: meraki clientIP: 50.248.170.72 serverIP: 43.215.188.248
Explain this syslog message
<134>Original Address=75.146.93.165 1 1658148022.065083626 M61_MX67C_Savannah flows src=197.194.157.13 dst=71.112.135.252 protocol=tcp sport=48513 dport=4047 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 4047, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1658148022.065083626 M61_MX67C_Savannah flows src=197.194.157.13 dst=71.112.135.252 protocol=tcp sport=48513 dport=4047 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 48513, "protocol": 6, "streamName": "meraki", "clientIP": "197.194.157.13", "serverIP": "71.112.135.252" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1658148022.065083626 M61_MX67C_Savannah flows src=197.194.157.13 dst=71.112.135.252 protocol=tcp sport=48513 dport=4047 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1658148022.065083626 M61_MX67C_Savannah flows src=197.194.157.13 dst=71.112.135.252 protocol=tcp sport=48513 dport=4047 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 4047 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 48513 protocol: 6 streamName: meraki clientIP: 197.194.157.13 serverIP: 71.112.135.252
Explain this syslog message
<134>Original Address=75.146.93.165 1 1658148022.065083626 M61_MX67C_Savannah flows src=216.126.195.80 dst=21.216.16.79 protocol=tcp sport=48513 dport=4047 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 4047, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1658148022.065083626 M61_MX67C_Savannah flows src=216.126.195.80 dst=21.216.16.79 protocol=tcp sport=48513 dport=4047 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 48513, "protocol": 6, "streamName": "meraki", "clientIP": "216.126.195.80", "serverIP": "21.216.16.79" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1658148022.065083626 M61_MX67C_Savannah flows src=216.126.195.80 dst=21.216.16.79 protocol=tcp sport=48513 dport=4047 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1658148022.065083626 M61_MX67C_Savannah flows src=216.126.195.80 dst=21.216.16.79 protocol=tcp sport=48513 dport=4047 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 4047 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 48513 protocol: 6 streamName: meraki clientIP: 216.126.195.80 serverIP: 21.216.16.79
Explain this syslog message
<134>Original Address=75.146.93.165 1 1658148022.065083626 M61_MX67C_Savannah flows src=127.172.115.164 dst=76.215.27.93 protocol=tcp sport=48513 dport=4047 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 4047, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1658148022.065083626 M61_MX67C_Savannah flows src=127.172.115.164 dst=76.215.27.93 protocol=tcp sport=48513 dport=4047 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 48513, "protocol": 6, "streamName": "meraki", "clientIP": "127.172.115.164", "serverIP": "76.215.27.93" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1658148022.065083626 M61_MX67C_Savannah flows src=127.172.115.164 dst=76.215.27.93 protocol=tcp sport=48513 dport=4047 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1658148022.065083626 M61_MX67C_Savannah flows src=127.172.115.164 dst=76.215.27.93 protocol=tcp sport=48513 dport=4047 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 4047 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 48513 protocol: 6 streamName: meraki clientIP: 127.172.115.164 serverIP: 76.215.27.93
Explain this syslog message
<134>Original Address=75.146.93.165 1 1658148022.065083626 M61_MX67C_Savannah flows src=91.144.194.34 dst=233.164.10.201 protocol=tcp sport=48513 dport=4047 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 4047, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1658148022.065083626 M61_MX67C_Savannah flows src=91.144.194.34 dst=233.164.10.201 protocol=tcp sport=48513 dport=4047 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 48513, "protocol": 6, "streamName": "meraki", "clientIP": "91.144.194.34", "serverIP": "233.164.10.201" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1658148022.065083626 M61_MX67C_Savannah flows src=91.144.194.34 dst=233.164.10.201 protocol=tcp sport=48513 dport=4047 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1658148022.065083626 M61_MX67C_Savannah flows src=91.144.194.34 dst=233.164.10.201 protocol=tcp sport=48513 dport=4047 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 4047 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 48513 protocol: 6 streamName: meraki clientIP: 91.144.194.34 serverIP: 233.164.10.201
Explain this syslog message
<134>Original Address=75.146.93.165 1 1658148028.078943266 M61_MX67C_Savannah flows src=92.139.236.116 dst=89.159.108.233 protocol=tcp sport=47065 dport=5996 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5996, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1658148028.078943266 M61_MX67C_Savannah flows src=92.139.236.116 dst=89.159.108.233 protocol=tcp sport=47065 dport=5996 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 47065, "protocol": 6, "streamName": "meraki", "clientIP": "92.139.236.116", "serverIP": "89.159.108.233" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1658148028.078943266 M61_MX67C_Savannah flows src=92.139.236.116 dst=89.159.108.233 protocol=tcp sport=47065 dport=5996 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1658148028.078943266 M61_MX67C_Savannah flows src=92.139.236.116 dst=89.159.108.233 protocol=tcp sport=47065 dport=5996 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5996 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 47065 protocol: 6 streamName: meraki clientIP: 92.139.236.116 serverIP: 89.159.108.233
Explain this syslog message
<134>Original Address=75.146.93.165 1 1658148028.078943266 M61_MX67C_Savannah flows src=164.189.167.104 dst=8.251.171.148 protocol=tcp sport=47065 dport=5996 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5996, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1658148028.078943266 M61_MX67C_Savannah flows src=164.189.167.104 dst=8.251.171.148 protocol=tcp sport=47065 dport=5996 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 47065, "protocol": 6, "streamName": "meraki", "clientIP": "164.189.167.104", "serverIP": "8.251.171.148" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1658148028.078943266 M61_MX67C_Savannah flows src=164.189.167.104 dst=8.251.171.148 protocol=tcp sport=47065 dport=5996 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1658148028.078943266 M61_MX67C_Savannah flows src=164.189.167.104 dst=8.251.171.148 protocol=tcp sport=47065 dport=5996 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5996 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 47065 protocol: 6 streamName: meraki clientIP: 164.189.167.104 serverIP: 8.251.171.148
Explain this syslog message
<134>Original Address=75.146.93.165 1 1658148028.078943266 M61_MX67C_Savannah flows src=148.137.146.15 dst=180.123.115.6 protocol=tcp sport=47065 dport=5996 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5996, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1658148028.078943266 M61_MX67C_Savannah flows src=148.137.146.15 dst=180.123.115.6 protocol=tcp sport=47065 dport=5996 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 47065, "protocol": 6, "streamName": "meraki", "clientIP": "148.137.146.15", "serverIP": "180.123.115.6" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1658148028.078943266 M61_MX67C_Savannah flows src=148.137.146.15 dst=180.123.115.6 protocol=tcp sport=47065 dport=5996 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1658148028.078943266 M61_MX67C_Savannah flows src=148.137.146.15 dst=180.123.115.6 protocol=tcp sport=47065 dport=5996 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5996 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 47065 protocol: 6 streamName: meraki clientIP: 148.137.146.15 serverIP: 180.123.115.6
Explain this syslog message
<134>Original Address=75.146.93.165 1 1658148028.078943266 M61_MX67C_Savannah flows src=80.198.236.240 dst=84.170.13.163 protocol=tcp sport=47065 dport=5996 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5996, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1658148028.078943266 M61_MX67C_Savannah flows src=80.198.236.240 dst=84.170.13.163 protocol=tcp sport=47065 dport=5996 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 47065, "protocol": 6, "streamName": "meraki", "clientIP": "80.198.236.240", "serverIP": "84.170.13.163" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1658148028.078943266 M61_MX67C_Savannah flows src=80.198.236.240 dst=84.170.13.163 protocol=tcp sport=47065 dport=5996 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1658148028.078943266 M61_MX67C_Savannah flows src=80.198.236.240 dst=84.170.13.163 protocol=tcp sport=47065 dport=5996 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5996 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 47065 protocol: 6 streamName: meraki clientIP: 80.198.236.240 serverIP: 84.170.13.163
Explain this syslog message
<134>Original Address=75.146.93.165 1 1658148039.482242946 M61_MX67C_Savannah flows src=120.38.64.239 dst=246.133.225.110 protocol=tcp sport=47065 dport=5996 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5996, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1658148039.482242946 M61_MX67C_Savannah flows src=120.38.64.239 dst=246.133.225.110 protocol=tcp sport=47065 dport=5996 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 47065, "protocol": 6, "streamName": "meraki", "clientIP": "120.38.64.239", "serverIP": "246.133.225.110" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1658148039.482242946 M61_MX67C_Savannah flows src=120.38.64.239 dst=246.133.225.110 protocol=tcp sport=47065 dport=5996 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1658148039.482242946 M61_MX67C_Savannah flows src=120.38.64.239 dst=246.133.225.110 protocol=tcp sport=47065 dport=5996 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5996 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 47065 protocol: 6 streamName: meraki clientIP: 120.38.64.239 serverIP: 246.133.225.110
Explain this syslog message
<134>Original Address=75.146.93.165 1 1658148039.482242946 M61_MX67C_Savannah flows src=216.113.7.223 dst=151.25.153.71 protocol=tcp sport=47065 dport=5996 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5996, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1658148039.482242946 M61_MX67C_Savannah flows src=216.113.7.223 dst=151.25.153.71 protocol=tcp sport=47065 dport=5996 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 47065, "protocol": 6, "streamName": "meraki", "clientIP": "216.113.7.223", "serverIP": "151.25.153.71" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1658148039.482242946 M61_MX67C_Savannah flows src=216.113.7.223 dst=151.25.153.71 protocol=tcp sport=47065 dport=5996 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1658148039.482242946 M61_MX67C_Savannah flows src=216.113.7.223 dst=151.25.153.71 protocol=tcp sport=47065 dport=5996 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5996 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 47065 protocol: 6 streamName: meraki clientIP: 216.113.7.223 serverIP: 151.25.153.71
Explain this syslog message
<134>Original Address=75.146.93.165 1 1658148039.482242946 M61_MX67C_Savannah flows src=53.204.198.230 dst=227.158.123.72 protocol=tcp sport=47065 dport=5996 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5996, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1658148039.482242946 M61_MX67C_Savannah flows src=53.204.198.230 dst=227.158.123.72 protocol=tcp sport=47065 dport=5996 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 47065, "protocol": 6, "streamName": "meraki", "clientIP": "53.204.198.230", "serverIP": "227.158.123.72" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1658148039.482242946 M61_MX67C_Savannah flows src=53.204.198.230 dst=227.158.123.72 protocol=tcp sport=47065 dport=5996 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1658148039.482242946 M61_MX67C_Savannah flows src=53.204.198.230 dst=227.158.123.72 protocol=tcp sport=47065 dport=5996 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5996 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 47065 protocol: 6 streamName: meraki clientIP: 53.204.198.230 serverIP: 227.158.123.72
Explain this syslog message
<134>Original Address=75.146.93.165 1 1658148039.482242946 M61_MX67C_Savannah flows src=95.121.82.38 dst=41.56.217.184 protocol=tcp sport=47065 dport=5996 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5996, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1658148039.482242946 M61_MX67C_Savannah flows src=95.121.82.38 dst=41.56.217.184 protocol=tcp sport=47065 dport=5996 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 47065, "protocol": 6, "streamName": "meraki", "clientIP": "95.121.82.38", "serverIP": "41.56.217.184" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1658148039.482242946 M61_MX67C_Savannah flows src=95.121.82.38 dst=41.56.217.184 protocol=tcp sport=47065 dport=5996 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1658148039.482242946 M61_MX67C_Savannah flows src=95.121.82.38 dst=41.56.217.184 protocol=tcp sport=47065 dport=5996 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5996 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 47065 protocol: 6 streamName: meraki clientIP: 95.121.82.38 serverIP: 41.56.217.184
Explain this syslog message
<134>Original Address=75.146.93.165 1 1658148033.085257466 M61_MX67C_Savannah flows src=224.108.246.67 dst=252.47.147.106 protocol=tcp sport=39327 dport=44818 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 39327, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1658148033.085257466 M61_MX67C_Savannah flows src=224.108.246.67 dst=252.47.147.106 protocol=tcp sport=39327 dport=44818 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 44818, "protocol": 6, "streamName": "meraki", "clientIP": "252.47.147.106", "serverIP": "224.108.246.67" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1658148033.085257466 M61_MX67C_Savannah flows src=224.108.246.67 dst=252.47.147.106 protocol=tcp sport=39327 dport=44818 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1658148033.085257466 M61_MX67C_Savannah flows src=224.108.246.67 dst=252.47.147.106 protocol=tcp sport=39327 dport=44818 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 39327 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 44818 protocol: 6 streamName: meraki clientIP: 252.47.147.106 serverIP: 224.108.246.67
Explain this syslog message
<134>Original Address=75.146.93.165 1 1658148033.085257466 M61_MX67C_Savannah flows src=158.196.213.138 dst=255.25.155.164 protocol=tcp sport=39327 dport=44818 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 39327, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1658148033.085257466 M61_MX67C_Savannah flows src=158.196.213.138 dst=255.25.155.164 protocol=tcp sport=39327 dport=44818 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 44818, "protocol": 6, "streamName": "meraki", "clientIP": "255.25.155.164", "serverIP": "158.196.213.138" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1658148033.085257466 M61_MX67C_Savannah flows src=158.196.213.138 dst=255.25.155.164 protocol=tcp sport=39327 dport=44818 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1658148033.085257466 M61_MX67C_Savannah flows src=158.196.213.138 dst=255.25.155.164 protocol=tcp sport=39327 dport=44818 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 39327 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 44818 protocol: 6 streamName: meraki clientIP: 255.25.155.164 serverIP: 158.196.213.138
Explain this syslog message
<134>Original Address=75.146.93.165 1 1658148033.085257466 M61_MX67C_Savannah flows src=13.161.219.75 dst=93.77.20.244 protocol=tcp sport=39327 dport=44818 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 39327, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1658148033.085257466 M61_MX67C_Savannah flows src=13.161.219.75 dst=93.77.20.244 protocol=tcp sport=39327 dport=44818 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 44818, "protocol": 6, "streamName": "meraki", "clientIP": "93.77.20.244", "serverIP": "13.161.219.75" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1658148033.085257466 M61_MX67C_Savannah flows src=13.161.219.75 dst=93.77.20.244 protocol=tcp sport=39327 dport=44818 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1658148033.085257466 M61_MX67C_Savannah flows src=13.161.219.75 dst=93.77.20.244 protocol=tcp sport=39327 dport=44818 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 39327 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 44818 protocol: 6 streamName: meraki clientIP: 93.77.20.244 serverIP: 13.161.219.75
Explain this syslog message
<134>Original Address=75.146.93.165 1 1658148033.085257466 M61_MX67C_Savannah flows src=69.186.105.165 dst=78.61.146.215 protocol=tcp sport=39327 dport=44818 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 39327, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1658148033.085257466 M61_MX67C_Savannah flows src=69.186.105.165 dst=78.61.146.215 protocol=tcp sport=39327 dport=44818 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 44818, "protocol": 6, "streamName": "meraki", "clientIP": "78.61.146.215", "serverIP": "69.186.105.165" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1658148033.085257466 M61_MX67C_Savannah flows src=69.186.105.165 dst=78.61.146.215 protocol=tcp sport=39327 dport=44818 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1658148033.085257466 M61_MX67C_Savannah flows src=69.186.105.165 dst=78.61.146.215 protocol=tcp sport=39327 dport=44818 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 39327 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 44818 protocol: 6 streamName: meraki clientIP: 78.61.146.215 serverIP: 69.186.105.165
Explain this syslog message
<134>Original Address=75.146.93.165 1 1658148034.090233106 M61_MX67C_Savannah flows src=173.130.202.131 dst=213.144.19.253 protocol=tcp sport=47065 dport=5996 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5996, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1658148034.090233106 M61_MX67C_Savannah flows src=173.130.202.131 dst=213.144.19.253 protocol=tcp sport=47065 dport=5996 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 47065, "protocol": 6, "streamName": "meraki", "clientIP": "173.130.202.131", "serverIP": "213.144.19.253" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1658148034.090233106 M61_MX67C_Savannah flows src=173.130.202.131 dst=213.144.19.253 protocol=tcp sport=47065 dport=5996 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1658148034.090233106 M61_MX67C_Savannah flows src=173.130.202.131 dst=213.144.19.253 protocol=tcp sport=47065 dport=5996 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5996 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 47065 protocol: 6 streamName: meraki clientIP: 173.130.202.131 serverIP: 213.144.19.253
Explain this syslog message
<134>Original Address=75.146.93.165 1 1658148034.090233106 M61_MX67C_Savannah flows src=225.51.232.245 dst=102.210.247.236 protocol=tcp sport=47065 dport=5996 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5996, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1658148034.090233106 M61_MX67C_Savannah flows src=225.51.232.245 dst=102.210.247.236 protocol=tcp sport=47065 dport=5996 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 47065, "protocol": 6, "streamName": "meraki", "clientIP": "225.51.232.245", "serverIP": "102.210.247.236" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1658148034.090233106 M61_MX67C_Savannah flows src=225.51.232.245 dst=102.210.247.236 protocol=tcp sport=47065 dport=5996 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1658148034.090233106 M61_MX67C_Savannah flows src=225.51.232.245 dst=102.210.247.236 protocol=tcp sport=47065 dport=5996 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5996 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 47065 protocol: 6 streamName: meraki clientIP: 225.51.232.245 serverIP: 102.210.247.236
Explain this syslog message
<134>Original Address=75.146.93.165 1 1658148034.090233106 M61_MX67C_Savannah flows src=229.133.181.18 dst=27.210.30.70 protocol=tcp sport=47065 dport=5996 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5996, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1658148034.090233106 M61_MX67C_Savannah flows src=229.133.181.18 dst=27.210.30.70 protocol=tcp sport=47065 dport=5996 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 47065, "protocol": 6, "streamName": "meraki", "clientIP": "229.133.181.18", "serverIP": "27.210.30.70" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1658148034.090233106 M61_MX67C_Savannah flows src=229.133.181.18 dst=27.210.30.70 protocol=tcp sport=47065 dport=5996 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1658148034.090233106 M61_MX67C_Savannah flows src=229.133.181.18 dst=27.210.30.70 protocol=tcp sport=47065 dport=5996 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5996 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 47065 protocol: 6 streamName: meraki clientIP: 229.133.181.18 serverIP: 27.210.30.70
Explain this syslog message
<134>Original Address=75.146.93.165 1 1658148034.090233106 M61_MX67C_Savannah flows src=96.71.230.187 dst=243.9.86.249 protocol=tcp sport=47065 dport=5996 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5996, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1658148034.090233106 M61_MX67C_Savannah flows src=96.71.230.187 dst=243.9.86.249 protocol=tcp sport=47065 dport=5996 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 47065, "protocol": 6, "streamName": "meraki", "clientIP": "96.71.230.187", "serverIP": "243.9.86.249" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1658148034.090233106 M61_MX67C_Savannah flows src=96.71.230.187 dst=243.9.86.249 protocol=tcp sport=47065 dport=5996 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1658148034.090233106 M61_MX67C_Savannah flows src=96.71.230.187 dst=243.9.86.249 protocol=tcp sport=47065 dport=5996 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5996 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 47065 protocol: 6 streamName: meraki clientIP: 96.71.230.187 serverIP: 243.9.86.249
Explain this syslog message
<134>Original Address=75.146.93.165 1 1658148302.077111706 M61_MX67C_Savannah flows src=140.92.192.125 dst=60.254.26.6 protocol=tcp sport=53134 dport=19034 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 19034, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1658148302.077111706 M61_MX67C_Savannah flows src=140.92.192.125 dst=60.254.26.6 protocol=tcp sport=53134 dport=19034 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 53134, "protocol": 6, "streamName": "meraki", "clientIP": "140.92.192.125", "serverIP": "60.254.26.6" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1658148302.077111706 M61_MX67C_Savannah flows src=140.92.192.125 dst=60.254.26.6 protocol=tcp sport=53134 dport=19034 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message