input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<134>Original Address=75.146.93.165 1 1658148302.077111706 M61_MX67C_Savannah flows src=140.92.192.125 dst=60.254.26.6 protocol=tcp sport=53134 dport=19034 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 19034
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 53134
protocol: 6
streamName: meraki
clientIP: 140.92.192.125
serverIP: 60.254.26.6
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1658148302.077111706 M61_MX67C_Savannah flows src=11.97.154.41 dst=127.218.212.37 protocol=tcp sport=53134 dport=19034 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 19034,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1658148302.077111706 M61_MX67C_Savannah flows src=11.97.154.41 dst=127.218.212.37 protocol=tcp sport=53134 dport=19034 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 53134,
"protocol": 6,
"streamName": "meraki",
"clientIP": "11.97.154.41",
"serverIP": "127.218.212.37"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1658148302.077111706 M61_MX67C_Savannah flows src=11.97.154.41 dst=127.218.212.37 protocol=tcp sport=53134 dport=19034 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1658148302.077111706 M61_MX67C_Savannah flows src=11.97.154.41 dst=127.218.212.37 protocol=tcp sport=53134 dport=19034 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 19034
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 53134
protocol: 6
streamName: meraki
clientIP: 11.97.154.41
serverIP: 127.218.212.37
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1658148302.077111706 M61_MX67C_Savannah flows src=36.24.44.150 dst=54.220.51.58 protocol=tcp sport=53134 dport=19034 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 19034,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1658148302.077111706 M61_MX67C_Savannah flows src=36.24.44.150 dst=54.220.51.58 protocol=tcp sport=53134 dport=19034 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 53134,
"protocol": 6,
"streamName": "meraki",
"clientIP": "36.24.44.150",
"serverIP": "54.220.51.58"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1658148302.077111706 M61_MX67C_Savannah flows src=36.24.44.150 dst=54.220.51.58 protocol=tcp sport=53134 dport=19034 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1658148302.077111706 M61_MX67C_Savannah flows src=36.24.44.150 dst=54.220.51.58 protocol=tcp sport=53134 dport=19034 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 19034
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 53134
protocol: 6
streamName: meraki
clientIP: 36.24.44.150
serverIP: 54.220.51.58
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1658148302.077111706 M61_MX67C_Savannah flows src=224.91.236.140 dst=26.185.115.169 protocol=tcp sport=53134 dport=19034 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 19034,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1658148302.077111706 M61_MX67C_Savannah flows src=224.91.236.140 dst=26.185.115.169 protocol=tcp sport=53134 dport=19034 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 53134,
"protocol": 6,
"streamName": "meraki",
"clientIP": "224.91.236.140",
"serverIP": "26.185.115.169"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1658148302.077111706 M61_MX67C_Savannah flows src=224.91.236.140 dst=26.185.115.169 protocol=tcp sport=53134 dport=19034 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1658148302.077111706 M61_MX67C_Savannah flows src=224.91.236.140 dst=26.185.115.169 protocol=tcp sport=53134 dport=19034 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 19034
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 53134
protocol: 6
streamName: meraki
clientIP: 224.91.236.140
serverIP: 26.185.115.169
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1658148027.758617172 NORDC_MX400_1 flows src=232.33.227.241 dst=0.142.148.123 protocol=tcp sport=27693 dport=12558 pattern: 1 dst 0.142.148.123
|
{
"senderhost": "192.168.2.250",
"serverport": 12558,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658148027.758617172 NORDC_MX400_1 flows src=232.33.227.241 dst=0.142.148.123 protocol=tcp sport=27693 dport=12558 pattern: 1 dst 0.142.148.123",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 27693,
"protocol": 6,
"streamName": "meraki",
"clientIP": "232.33.227.241",
"serverIP": "0.142.148.123"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1658148027.758617172 NORDC_MX400_1 flows src=232.33.227.241 dst=0.142.148.123 protocol=tcp sport=27693 dport=12558 pattern: 1 dst 0.142.148.123
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1658148027.758617172 NORDC_MX400_1 flows src=232.33.227.241 dst=0.142.148.123 protocol=tcp sport=27693 dport=12558 pattern: 1 dst 0.142.148.123
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 12558
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 27693
protocol: 6
streamName: meraki
clientIP: 232.33.227.241
serverIP: 0.142.148.123
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1658148027.758617172 NORDC_MX400_1 flows src=5.42.49.255 dst=1.143.203.8 protocol=tcp sport=27693 dport=12558 pattern: 1 dst 1.143.203.8
|
{
"senderhost": "192.168.2.250",
"serverport": 12558,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658148027.758617172 NORDC_MX400_1 flows src=5.42.49.255 dst=1.143.203.8 protocol=tcp sport=27693 dport=12558 pattern: 1 dst 1.143.203.8",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 27693,
"protocol": 6,
"streamName": "meraki",
"clientIP": "5.42.49.255",
"serverIP": "1.143.203.8"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1658148027.758617172 NORDC_MX400_1 flows src=5.42.49.255 dst=1.143.203.8 protocol=tcp sport=27693 dport=12558 pattern: 1 dst 1.143.203.8
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1658148027.758617172 NORDC_MX400_1 flows src=5.42.49.255 dst=1.143.203.8 protocol=tcp sport=27693 dport=12558 pattern: 1 dst 1.143.203.8
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 12558
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 27693
protocol: 6
streamName: meraki
clientIP: 5.42.49.255
serverIP: 1.143.203.8
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1658148027.758617172 NORDC_MX400_1 flows src=235.70.137.222 dst=127.243.207.188 protocol=tcp sport=27693 dport=12558 pattern: 1 dst 127.243.207.188
|
{
"senderhost": "192.168.2.250",
"serverport": 12558,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658148027.758617172 NORDC_MX400_1 flows src=235.70.137.222 dst=127.243.207.188 protocol=tcp sport=27693 dport=12558 pattern: 1 dst 127.243.207.188",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 27693,
"protocol": 6,
"streamName": "meraki",
"clientIP": "235.70.137.222",
"serverIP": "127.243.207.188"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1658148027.758617172 NORDC_MX400_1 flows src=235.70.137.222 dst=127.243.207.188 protocol=tcp sport=27693 dport=12558 pattern: 1 dst 127.243.207.188
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1658148027.758617172 NORDC_MX400_1 flows src=235.70.137.222 dst=127.243.207.188 protocol=tcp sport=27693 dport=12558 pattern: 1 dst 127.243.207.188
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 12558
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 27693
protocol: 6
streamName: meraki
clientIP: 235.70.137.222
serverIP: 127.243.207.188
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1658148027.758617172 NORDC_MX400_1 flows src=1.110.157.155 dst=140.69.129.159 protocol=tcp sport=27693 dport=12558 pattern: 1 dst 140.69.129.159
|
{
"senderhost": "192.168.2.250",
"serverport": 12558,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658148027.758617172 NORDC_MX400_1 flows src=1.110.157.155 dst=140.69.129.159 protocol=tcp sport=27693 dport=12558 pattern: 1 dst 140.69.129.159",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 27693,
"protocol": 6,
"streamName": "meraki",
"clientIP": "1.110.157.155",
"serverIP": "140.69.129.159"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1658148027.758617172 NORDC_MX400_1 flows src=1.110.157.155 dst=140.69.129.159 protocol=tcp sport=27693 dport=12558 pattern: 1 dst 140.69.129.159
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1658148027.758617172 NORDC_MX400_1 flows src=1.110.157.155 dst=140.69.129.159 protocol=tcp sport=27693 dport=12558 pattern: 1 dst 140.69.129.159
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 12558
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 27693
protocol: 6
streamName: meraki
clientIP: 1.110.157.155
serverIP: 140.69.129.159
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1658148014.342855854 NORDC_MX400_1 flows src=179.107.192.121 dst=182.85.107.235 protocol=tcp sport=53164 dport=23375 pattern: 1 dst 182.85.107.235
|
{
"senderhost": "192.168.2.250",
"serverport": 23375,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658148014.342855854 NORDC_MX400_1 flows src=179.107.192.121 dst=182.85.107.235 protocol=tcp sport=53164 dport=23375 pattern: 1 dst 182.85.107.235",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 53164,
"protocol": 6,
"streamName": "meraki",
"clientIP": "179.107.192.121",
"serverIP": "182.85.107.235"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1658148014.342855854 NORDC_MX400_1 flows src=179.107.192.121 dst=182.85.107.235 protocol=tcp sport=53164 dport=23375 pattern: 1 dst 182.85.107.235
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1658148014.342855854 NORDC_MX400_1 flows src=179.107.192.121 dst=182.85.107.235 protocol=tcp sport=53164 dport=23375 pattern: 1 dst 182.85.107.235
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 23375
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 53164
protocol: 6
streamName: meraki
clientIP: 179.107.192.121
serverIP: 182.85.107.235
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1658148014.342855854 NORDC_MX400_1 flows src=103.99.45.240 dst=214.168.9.166 protocol=tcp sport=53164 dport=23375 pattern: 1 dst 214.168.9.166
|
{
"senderhost": "192.168.2.250",
"serverport": 23375,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658148014.342855854 NORDC_MX400_1 flows src=103.99.45.240 dst=214.168.9.166 protocol=tcp sport=53164 dport=23375 pattern: 1 dst 214.168.9.166",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 53164,
"protocol": 6,
"streamName": "meraki",
"clientIP": "103.99.45.240",
"serverIP": "214.168.9.166"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1658148014.342855854 NORDC_MX400_1 flows src=103.99.45.240 dst=214.168.9.166 protocol=tcp sport=53164 dport=23375 pattern: 1 dst 214.168.9.166
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1658148014.342855854 NORDC_MX400_1 flows src=103.99.45.240 dst=214.168.9.166 protocol=tcp sport=53164 dport=23375 pattern: 1 dst 214.168.9.166
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 23375
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 53164
protocol: 6
streamName: meraki
clientIP: 103.99.45.240
serverIP: 214.168.9.166
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1658148014.342855854 NORDC_MX400_1 flows src=120.138.168.198 dst=160.13.68.57 protocol=tcp sport=53164 dport=23375 pattern: 1 dst 160.13.68.57
|
{
"senderhost": "192.168.2.250",
"serverport": 23375,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658148014.342855854 NORDC_MX400_1 flows src=120.138.168.198 dst=160.13.68.57 protocol=tcp sport=53164 dport=23375 pattern: 1 dst 160.13.68.57",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 53164,
"protocol": 6,
"streamName": "meraki",
"clientIP": "120.138.168.198",
"serverIP": "160.13.68.57"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1658148014.342855854 NORDC_MX400_1 flows src=120.138.168.198 dst=160.13.68.57 protocol=tcp sport=53164 dport=23375 pattern: 1 dst 160.13.68.57
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1658148014.342855854 NORDC_MX400_1 flows src=120.138.168.198 dst=160.13.68.57 protocol=tcp sport=53164 dport=23375 pattern: 1 dst 160.13.68.57
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 23375
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 53164
protocol: 6
streamName: meraki
clientIP: 120.138.168.198
serverIP: 160.13.68.57
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1658148014.342855854 NORDC_MX400_1 flows src=196.134.137.19 dst=52.163.186.37 protocol=tcp sport=53164 dport=23375 pattern: 1 dst 52.163.186.37
|
{
"senderhost": "192.168.2.250",
"serverport": 23375,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658148014.342855854 NORDC_MX400_1 flows src=196.134.137.19 dst=52.163.186.37 protocol=tcp sport=53164 dport=23375 pattern: 1 dst 52.163.186.37",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 53164,
"protocol": 6,
"streamName": "meraki",
"clientIP": "196.134.137.19",
"serverIP": "52.163.186.37"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1658148014.342855854 NORDC_MX400_1 flows src=196.134.137.19 dst=52.163.186.37 protocol=tcp sport=53164 dport=23375 pattern: 1 dst 52.163.186.37
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1658148014.342855854 NORDC_MX400_1 flows src=196.134.137.19 dst=52.163.186.37 protocol=tcp sport=53164 dport=23375 pattern: 1 dst 52.163.186.37
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 23375
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 53164
protocol: 6
streamName: meraki
clientIP: 196.134.137.19
serverIP: 52.163.186.37
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1658148034.468129517 NORDC_MX400_1 flows src=96.68.202.71 dst=115.68.16.92 protocol=tcp sport=20091 dport=10002 pattern: 1 dst 115.68.16.92
|
{
"senderhost": "192.168.2.250",
"serverport": 10002,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658148034.468129517 NORDC_MX400_1 flows src=96.68.202.71 dst=115.68.16.92 protocol=tcp sport=20091 dport=10002 pattern: 1 dst 115.68.16.92",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 20091,
"protocol": 6,
"streamName": "meraki",
"clientIP": "96.68.202.71",
"serverIP": "115.68.16.92"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1658148034.468129517 NORDC_MX400_1 flows src=96.68.202.71 dst=115.68.16.92 protocol=tcp sport=20091 dport=10002 pattern: 1 dst 115.68.16.92
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1658148034.468129517 NORDC_MX400_1 flows src=96.68.202.71 dst=115.68.16.92 protocol=tcp sport=20091 dport=10002 pattern: 1 dst 115.68.16.92
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 10002
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 20091
protocol: 6
streamName: meraki
clientIP: 96.68.202.71
serverIP: 115.68.16.92
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1658148034.468129517 NORDC_MX400_1 flows src=32.157.244.90 dst=225.209.177.93 protocol=tcp sport=20091 dport=10002 pattern: 1 dst 225.209.177.93
|
{
"senderhost": "192.168.2.250",
"serverport": 10002,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658148034.468129517 NORDC_MX400_1 flows src=32.157.244.90 dst=225.209.177.93 protocol=tcp sport=20091 dport=10002 pattern: 1 dst 225.209.177.93",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 20091,
"protocol": 6,
"streamName": "meraki",
"clientIP": "32.157.244.90",
"serverIP": "225.209.177.93"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1658148034.468129517 NORDC_MX400_1 flows src=32.157.244.90 dst=225.209.177.93 protocol=tcp sport=20091 dport=10002 pattern: 1 dst 225.209.177.93
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1658148034.468129517 NORDC_MX400_1 flows src=32.157.244.90 dst=225.209.177.93 protocol=tcp sport=20091 dport=10002 pattern: 1 dst 225.209.177.93
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 10002
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 20091
protocol: 6
streamName: meraki
clientIP: 32.157.244.90
serverIP: 225.209.177.93
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1658148034.468129517 NORDC_MX400_1 flows src=230.80.148.44 dst=49.245.97.170 protocol=tcp sport=20091 dport=10002 pattern: 1 dst 49.245.97.170
|
{
"senderhost": "192.168.2.250",
"serverport": 10002,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658148034.468129517 NORDC_MX400_1 flows src=230.80.148.44 dst=49.245.97.170 protocol=tcp sport=20091 dport=10002 pattern: 1 dst 49.245.97.170",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 20091,
"protocol": 6,
"streamName": "meraki",
"clientIP": "230.80.148.44",
"serverIP": "49.245.97.170"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1658148034.468129517 NORDC_MX400_1 flows src=230.80.148.44 dst=49.245.97.170 protocol=tcp sport=20091 dport=10002 pattern: 1 dst 49.245.97.170
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1658148034.468129517 NORDC_MX400_1 flows src=230.80.148.44 dst=49.245.97.170 protocol=tcp sport=20091 dport=10002 pattern: 1 dst 49.245.97.170
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 10002
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 20091
protocol: 6
streamName: meraki
clientIP: 230.80.148.44
serverIP: 49.245.97.170
|
Explain this syslog message
|
<134>Original Address=192.168.2.253 1 1658148034.468129517 NORDC_MX400_1 flows src=10.47.132.140 dst=40.64.150.38 protocol=tcp sport=20091 dport=10002 pattern: 1 dst 40.64.150.38
|
{
"senderhost": "192.168.2.250",
"serverport": 10002,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658148034.468129517 NORDC_MX400_1 flows src=10.47.132.140 dst=40.64.150.38 protocol=tcp sport=20091 dport=10002 pattern: 1 dst 40.64.150.38",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 20091,
"protocol": 6,
"streamName": "meraki",
"clientIP": "10.47.132.140",
"serverIP": "40.64.150.38"
}
|
Create a JSON artifact from the message
|
<134>Original Address=192.168.2.253 1 1658148034.468129517 NORDC_MX400_1 flows src=10.47.132.140 dst=40.64.150.38 protocol=tcp sport=20091 dport=10002 pattern: 1 dst 40.64.150.38
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=192.168.2.253 1 1658148034.468129517 NORDC_MX400_1 flows src=10.47.132.140 dst=40.64.150.38 protocol=tcp sport=20091 dport=10002 pattern: 1 dst 40.64.150.38
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 10002
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 20091
protocol: 6
streamName: meraki
clientIP: 10.47.132.140
serverIP: 40.64.150.38
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1658148285.473393706 M61_MX67C_Savannah flows src=126.150.217.198 dst=66.132.94.107 protocol=udp sport=6004 dport=38073 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 6004,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1658148285.473393706 M61_MX67C_Savannah flows src=126.150.217.198 dst=66.132.94.107 protocol=udp sport=6004 dport=38073 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 38073,
"protocol": 17,
"streamName": "meraki",
"clientIP": "66.132.94.107",
"serverIP": "126.150.217.198"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1658148285.473393706 M61_MX67C_Savannah flows src=126.150.217.198 dst=66.132.94.107 protocol=udp sport=6004 dport=38073 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1658148285.473393706 M61_MX67C_Savannah flows src=126.150.217.198 dst=66.132.94.107 protocol=udp sport=6004 dport=38073 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 6004
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 38073
protocol: 17
streamName: meraki
clientIP: 66.132.94.107
serverIP: 126.150.217.198
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1658148285.473393706 M61_MX67C_Savannah flows src=68.47.181.216 dst=205.167.44.176 protocol=udp sport=6004 dport=38073 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 6004,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1658148285.473393706 M61_MX67C_Savannah flows src=68.47.181.216 dst=205.167.44.176 protocol=udp sport=6004 dport=38073 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 38073,
"protocol": 17,
"streamName": "meraki",
"clientIP": "205.167.44.176",
"serverIP": "68.47.181.216"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1658148285.473393706 M61_MX67C_Savannah flows src=68.47.181.216 dst=205.167.44.176 protocol=udp sport=6004 dport=38073 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1658148285.473393706 M61_MX67C_Savannah flows src=68.47.181.216 dst=205.167.44.176 protocol=udp sport=6004 dport=38073 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 6004
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 38073
protocol: 17
streamName: meraki
clientIP: 205.167.44.176
serverIP: 68.47.181.216
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1658148285.473466466 M61_MX67C_Savannah flows src=25.95.218.154 dst=56.217.136.24 protocol=udp sport=6004 dport=38073 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 6004,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1658148285.473466466 M61_MX67C_Savannah flows src=25.95.218.154 dst=56.217.136.24 protocol=udp sport=6004 dport=38073 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 38073,
"protocol": 17,
"streamName": "meraki",
"clientIP": "56.217.136.24",
"serverIP": "25.95.218.154"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1658148285.473466466 M61_MX67C_Savannah flows src=25.95.218.154 dst=56.217.136.24 protocol=udp sport=6004 dport=38073 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1658148285.473466466 M61_MX67C_Savannah flows src=25.95.218.154 dst=56.217.136.24 protocol=udp sport=6004 dport=38073 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 6004
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 38073
protocol: 17
streamName: meraki
clientIP: 56.217.136.24
serverIP: 25.95.218.154
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1658148285.473466466 M61_MX67C_Savannah flows src=253.108.8.163 dst=129.35.198.88 protocol=udp sport=6004 dport=38073 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 6004,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1658148285.473466466 M61_MX67C_Savannah flows src=253.108.8.163 dst=129.35.198.88 protocol=udp sport=6004 dport=38073 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 38073,
"protocol": 17,
"streamName": "meraki",
"clientIP": "129.35.198.88",
"serverIP": "253.108.8.163"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1658148285.473466466 M61_MX67C_Savannah flows src=253.108.8.163 dst=129.35.198.88 protocol=udp sport=6004 dport=38073 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1658148285.473466466 M61_MX67C_Savannah flows src=253.108.8.163 dst=129.35.198.88 protocol=udp sport=6004 dport=38073 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 6004
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 38073
protocol: 17
streamName: meraki
clientIP: 129.35.198.88
serverIP: 253.108.8.163
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1658148285.473393706 M61_MX67C_Savannah flows src=145.66.171.9 dst=184.138.110.226 protocol=udp sport=6004 dport=38073 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 6004,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1658148285.473393706 M61_MX67C_Savannah flows src=145.66.171.9 dst=184.138.110.226 protocol=udp sport=6004 dport=38073 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 38073,
"protocol": 17,
"streamName": "meraki",
"clientIP": "184.138.110.226",
"serverIP": "145.66.171.9"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1658148285.473393706 M61_MX67C_Savannah flows src=145.66.171.9 dst=184.138.110.226 protocol=udp sport=6004 dport=38073 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1658148285.473393706 M61_MX67C_Savannah flows src=145.66.171.9 dst=184.138.110.226 protocol=udp sport=6004 dport=38073 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 6004
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 38073
protocol: 17
streamName: meraki
clientIP: 184.138.110.226
serverIP: 145.66.171.9
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1658148285.473393706 M61_MX67C_Savannah flows src=54.208.29.12 dst=56.40.147.112 protocol=udp sport=6004 dport=38073 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 6004,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1658148285.473393706 M61_MX67C_Savannah flows src=54.208.29.12 dst=56.40.147.112 protocol=udp sport=6004 dport=38073 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 38073,
"protocol": 17,
"streamName": "meraki",
"clientIP": "56.40.147.112",
"serverIP": "54.208.29.12"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1658148285.473393706 M61_MX67C_Savannah flows src=54.208.29.12 dst=56.40.147.112 protocol=udp sport=6004 dport=38073 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1658148285.473393706 M61_MX67C_Savannah flows src=54.208.29.12 dst=56.40.147.112 protocol=udp sport=6004 dport=38073 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 6004
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 38073
protocol: 17
streamName: meraki
clientIP: 56.40.147.112
serverIP: 54.208.29.12
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1658148285.473466466 M61_MX67C_Savannah flows src=236.175.221.68 dst=43.83.121.31 protocol=udp sport=6004 dport=38073 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 6004,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1658148285.473466466 M61_MX67C_Savannah flows src=236.175.221.68 dst=43.83.121.31 protocol=udp sport=6004 dport=38073 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 38073,
"protocol": 17,
"streamName": "meraki",
"clientIP": "43.83.121.31",
"serverIP": "236.175.221.68"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1658148285.473466466 M61_MX67C_Savannah flows src=236.175.221.68 dst=43.83.121.31 protocol=udp sport=6004 dport=38073 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1658148285.473466466 M61_MX67C_Savannah flows src=236.175.221.68 dst=43.83.121.31 protocol=udp sport=6004 dport=38073 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 6004
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 38073
protocol: 17
streamName: meraki
clientIP: 43.83.121.31
serverIP: 236.175.221.68
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1658148285.473466466 M61_MX67C_Savannah flows src=182.143.230.41 dst=144.181.95.252 protocol=udp sport=6004 dport=38073 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 6004,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1658148285.473466466 M61_MX67C_Savannah flows src=182.143.230.41 dst=144.181.95.252 protocol=udp sport=6004 dport=38073 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 38073,
"protocol": 17,
"streamName": "meraki",
"clientIP": "144.181.95.252",
"serverIP": "182.143.230.41"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1658148285.473466466 M61_MX67C_Savannah flows src=182.143.230.41 dst=144.181.95.252 protocol=udp sport=6004 dport=38073 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1658148285.473466466 M61_MX67C_Savannah flows src=182.143.230.41 dst=144.181.95.252 protocol=udp sport=6004 dport=38073 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 6004
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 38073
protocol: 17
streamName: meraki
clientIP: 144.181.95.252
serverIP: 182.143.230.41
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1658148300.330280466 M61_MX67C_Savannah flows src=27.178.2.243 dst=148.68.253.104 protocol=udp sport=5967 dport=28947 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5967,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1658148300.330280466 M61_MX67C_Savannah flows src=27.178.2.243 dst=148.68.253.104 protocol=udp sport=5967 dport=28947 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 28947,
"protocol": 17,
"streamName": "meraki",
"clientIP": "148.68.253.104",
"serverIP": "27.178.2.243"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1658148300.330280466 M61_MX67C_Savannah flows src=27.178.2.243 dst=148.68.253.104 protocol=udp sport=5967 dport=28947 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1658148300.330280466 M61_MX67C_Savannah flows src=27.178.2.243 dst=148.68.253.104 protocol=udp sport=5967 dport=28947 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5967
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 28947
protocol: 17
streamName: meraki
clientIP: 148.68.253.104
serverIP: 27.178.2.243
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1658148300.330280466 M61_MX67C_Savannah flows src=226.127.176.151 dst=10.139.253.136 protocol=udp sport=5967 dport=28947 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5967,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1658148300.330280466 M61_MX67C_Savannah flows src=226.127.176.151 dst=10.139.253.136 protocol=udp sport=5967 dport=28947 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 28947,
"protocol": 17,
"streamName": "meraki",
"clientIP": "10.139.253.136",
"serverIP": "226.127.176.151"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1658148300.330280466 M61_MX67C_Savannah flows src=226.127.176.151 dst=10.139.253.136 protocol=udp sport=5967 dport=28947 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1658148300.330280466 M61_MX67C_Savannah flows src=226.127.176.151 dst=10.139.253.136 protocol=udp sport=5967 dport=28947 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5967
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 28947
protocol: 17
streamName: meraki
clientIP: 10.139.253.136
serverIP: 226.127.176.151
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1658148300.330280466 M61_MX67C_Savannah flows src=157.106.228.61 dst=128.0.46.41 protocol=udp sport=5967 dport=28947 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5967,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1658148300.330280466 M61_MX67C_Savannah flows src=157.106.228.61 dst=128.0.46.41 protocol=udp sport=5967 dport=28947 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 28947,
"protocol": 17,
"streamName": "meraki",
"clientIP": "128.0.46.41",
"serverIP": "157.106.228.61"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1658148300.330280466 M61_MX67C_Savannah flows src=157.106.228.61 dst=128.0.46.41 protocol=udp sport=5967 dport=28947 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1658148300.330280466 M61_MX67C_Savannah flows src=157.106.228.61 dst=128.0.46.41 protocol=udp sport=5967 dport=28947 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5967
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 28947
protocol: 17
streamName: meraki
clientIP: 128.0.46.41
serverIP: 157.106.228.61
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1658148300.330280466 M61_MX67C_Savannah flows src=10.222.100.197 dst=187.227.176.77 protocol=udp sport=5967 dport=28947 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5967,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1658148300.330280466 M61_MX67C_Savannah flows src=10.222.100.197 dst=187.227.176.77 protocol=udp sport=5967 dport=28947 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 28947,
"protocol": 17,
"streamName": "meraki",
"clientIP": "187.227.176.77",
"serverIP": "10.222.100.197"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1658148300.330280466 M61_MX67C_Savannah flows src=10.222.100.197 dst=187.227.176.77 protocol=udp sport=5967 dport=28947 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1658148300.330280466 M61_MX67C_Savannah flows src=10.222.100.197 dst=187.227.176.77 protocol=udp sport=5967 dport=28947 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5967
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 28947
protocol: 17
streamName: meraki
clientIP: 187.227.176.77
serverIP: 10.222.100.197
|
Explain this syslog message
|
<134>Original Address=143.196.242.57 1 1658148301.911582759 M64_MX67C_Augusta flows src=225.77.248.206 dst=143.196.242.57 protocol=udp sport=5976 dport=47643 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5976,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=143.196.242.57 1 1658148301.911582759 M64_MX67C_Augusta flows src=225.77.248.206 dst=143.196.242.57 protocol=udp sport=5976 dport=47643 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 47643,
"protocol": 17,
"streamName": "meraki",
"clientIP": "143.196.242.57",
"serverIP": "225.77.248.206"
}
|
Create a JSON artifact from the message
|
<134>Original Address=143.196.242.57 1 1658148301.911582759 M64_MX67C_Augusta flows src=225.77.248.206 dst=143.196.242.57 protocol=udp sport=5976 dport=47643 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=143.196.242.57 1 1658148301.911582759 M64_MX67C_Augusta flows src=225.77.248.206 dst=143.196.242.57 protocol=udp sport=5976 dport=47643 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5976
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 47643
protocol: 17
streamName: meraki
clientIP: 143.196.242.57
serverIP: 225.77.248.206
|
Explain this syslog message
|
<134>Original Address=139.145.161.165 1 1658148301.911582759 M64_MX67C_Augusta flows src=202.229.179.85 dst=139.145.161.165 protocol=udp sport=5976 dport=47643 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5976,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=139.145.161.165 1 1658148301.911582759 M64_MX67C_Augusta flows src=202.229.179.85 dst=139.145.161.165 protocol=udp sport=5976 dport=47643 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 47643,
"protocol": 17,
"streamName": "meraki",
"clientIP": "139.145.161.165",
"serverIP": "202.229.179.85"
}
|
Create a JSON artifact from the message
|
<134>Original Address=139.145.161.165 1 1658148301.911582759 M64_MX67C_Augusta flows src=202.229.179.85 dst=139.145.161.165 protocol=udp sport=5976 dport=47643 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=139.145.161.165 1 1658148301.911582759 M64_MX67C_Augusta flows src=202.229.179.85 dst=139.145.161.165 protocol=udp sport=5976 dport=47643 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5976
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 47643
protocol: 17
streamName: meraki
clientIP: 139.145.161.165
serverIP: 202.229.179.85
|
Explain this syslog message
|
<134>Original Address=94.99.20.156 1 1658148301.941441239 M64_MX67C_Augusta flows src=133.53.98.154 dst=94.99.20.156 protocol=udp sport=5976 dport=38220 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5976,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=94.99.20.156 1 1658148301.941441239 M64_MX67C_Augusta flows src=133.53.98.154 dst=94.99.20.156 protocol=udp sport=5976 dport=38220 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 38220,
"protocol": 17,
"streamName": "meraki",
"clientIP": "94.99.20.156",
"serverIP": "133.53.98.154"
}
|
Create a JSON artifact from the message
|
<134>Original Address=94.99.20.156 1 1658148301.941441239 M64_MX67C_Augusta flows src=133.53.98.154 dst=94.99.20.156 protocol=udp sport=5976 dport=38220 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=94.99.20.156 1 1658148301.941441239 M64_MX67C_Augusta flows src=133.53.98.154 dst=94.99.20.156 protocol=udp sport=5976 dport=38220 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5976
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 38220
protocol: 17
streamName: meraki
clientIP: 94.99.20.156
serverIP: 133.53.98.154
|
Explain this syslog message
|
<134>Original Address=194.254.146.69 1 1658148301.941441239 M64_MX67C_Augusta flows src=152.121.12.82 dst=194.254.146.69 protocol=udp sport=5976 dport=38220 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5976,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=194.254.146.69 1 1658148301.941441239 M64_MX67C_Augusta flows src=152.121.12.82 dst=194.254.146.69 protocol=udp sport=5976 dport=38220 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 38220,
"protocol": 17,
"streamName": "meraki",
"clientIP": "194.254.146.69",
"serverIP": "152.121.12.82"
}
|
Create a JSON artifact from the message
|
<134>Original Address=194.254.146.69 1 1658148301.941441239 M64_MX67C_Augusta flows src=152.121.12.82 dst=194.254.146.69 protocol=udp sport=5976 dport=38220 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=194.254.146.69 1 1658148301.941441239 M64_MX67C_Augusta flows src=152.121.12.82 dst=194.254.146.69 protocol=udp sport=5976 dport=38220 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5976
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 38220
protocol: 17
streamName: meraki
clientIP: 194.254.146.69
serverIP: 152.121.12.82
|
Explain this syslog message
|
<134>Original Address=13.28.212.217 1 1658148301.964343199 M64_MX67C_Augusta flows src=254.23.60.138 dst=13.28.212.217 protocol=udp sport=5976 dport=63612 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5976,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=13.28.212.217 1 1658148301.964343199 M64_MX67C_Augusta flows src=254.23.60.138 dst=13.28.212.217 protocol=udp sport=5976 dport=63612 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 63612,
"protocol": 17,
"streamName": "meraki",
"clientIP": "13.28.212.217",
"serverIP": "254.23.60.138"
}
|
Create a JSON artifact from the message
|
<134>Original Address=13.28.212.217 1 1658148301.964343199 M64_MX67C_Augusta flows src=254.23.60.138 dst=13.28.212.217 protocol=udp sport=5976 dport=63612 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=13.28.212.217 1 1658148301.964343199 M64_MX67C_Augusta flows src=254.23.60.138 dst=13.28.212.217 protocol=udp sport=5976 dport=63612 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5976
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 63612
protocol: 17
streamName: meraki
clientIP: 13.28.212.217
serverIP: 254.23.60.138
|
Explain this syslog message
|
<134>Original Address=229.139.53.117 1 1658148301.964343199 M64_MX67C_Augusta flows src=243.66.158.242 dst=229.139.53.117 protocol=udp sport=5976 dport=63612 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5976,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=229.139.53.117 1 1658148301.964343199 M64_MX67C_Augusta flows src=243.66.158.242 dst=229.139.53.117 protocol=udp sport=5976 dport=63612 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 63612,
"protocol": 17,
"streamName": "meraki",
"clientIP": "229.139.53.117",
"serverIP": "243.66.158.242"
}
|
Create a JSON artifact from the message
|
<134>Original Address=229.139.53.117 1 1658148301.964343199 M64_MX67C_Augusta flows src=243.66.158.242 dst=229.139.53.117 protocol=udp sport=5976 dport=63612 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=229.139.53.117 1 1658148301.964343199 M64_MX67C_Augusta flows src=243.66.158.242 dst=229.139.53.117 protocol=udp sport=5976 dport=63612 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5976
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 63612
protocol: 17
streamName: meraki
clientIP: 229.139.53.117
serverIP: 243.66.158.242
|
Explain this syslog message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.