input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<134>Original Address=75.146.93.165 1 1658148302.077111706 M61_MX67C_Savannah flows src=140.92.192.125 dst=60.254.26.6 protocol=tcp sport=53134 dport=19034 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 19034 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 53134 protocol: 6 streamName: meraki clientIP: 140.92.192.125 serverIP: 60.254.26.6
Explain this syslog message
<134>Original Address=75.146.93.165 1 1658148302.077111706 M61_MX67C_Savannah flows src=11.97.154.41 dst=127.218.212.37 protocol=tcp sport=53134 dport=19034 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 19034, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1658148302.077111706 M61_MX67C_Savannah flows src=11.97.154.41 dst=127.218.212.37 protocol=tcp sport=53134 dport=19034 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 53134, "protocol": 6, "streamName": "meraki", "clientIP": "11.97.154.41", "serverIP": "127.218.212.37" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1658148302.077111706 M61_MX67C_Savannah flows src=11.97.154.41 dst=127.218.212.37 protocol=tcp sport=53134 dport=19034 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1658148302.077111706 M61_MX67C_Savannah flows src=11.97.154.41 dst=127.218.212.37 protocol=tcp sport=53134 dport=19034 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 19034 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 53134 protocol: 6 streamName: meraki clientIP: 11.97.154.41 serverIP: 127.218.212.37
Explain this syslog message
<134>Original Address=75.146.93.165 1 1658148302.077111706 M61_MX67C_Savannah flows src=36.24.44.150 dst=54.220.51.58 protocol=tcp sport=53134 dport=19034 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 19034, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1658148302.077111706 M61_MX67C_Savannah flows src=36.24.44.150 dst=54.220.51.58 protocol=tcp sport=53134 dport=19034 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 53134, "protocol": 6, "streamName": "meraki", "clientIP": "36.24.44.150", "serverIP": "54.220.51.58" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1658148302.077111706 M61_MX67C_Savannah flows src=36.24.44.150 dst=54.220.51.58 protocol=tcp sport=53134 dport=19034 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1658148302.077111706 M61_MX67C_Savannah flows src=36.24.44.150 dst=54.220.51.58 protocol=tcp sport=53134 dport=19034 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 19034 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 53134 protocol: 6 streamName: meraki clientIP: 36.24.44.150 serverIP: 54.220.51.58
Explain this syslog message
<134>Original Address=75.146.93.165 1 1658148302.077111706 M61_MX67C_Savannah flows src=224.91.236.140 dst=26.185.115.169 protocol=tcp sport=53134 dport=19034 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 19034, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1658148302.077111706 M61_MX67C_Savannah flows src=224.91.236.140 dst=26.185.115.169 protocol=tcp sport=53134 dport=19034 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 53134, "protocol": 6, "streamName": "meraki", "clientIP": "224.91.236.140", "serverIP": "26.185.115.169" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1658148302.077111706 M61_MX67C_Savannah flows src=224.91.236.140 dst=26.185.115.169 protocol=tcp sport=53134 dport=19034 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1658148302.077111706 M61_MX67C_Savannah flows src=224.91.236.140 dst=26.185.115.169 protocol=tcp sport=53134 dport=19034 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 19034 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 53134 protocol: 6 streamName: meraki clientIP: 224.91.236.140 serverIP: 26.185.115.169
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658148027.758617172 NORDC_MX400_1 flows src=232.33.227.241 dst=0.142.148.123 protocol=tcp sport=27693 dport=12558 pattern: 1 dst 0.142.148.123
{ "senderhost": "192.168.2.250", "serverport": 12558, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658148027.758617172 NORDC_MX400_1 flows src=232.33.227.241 dst=0.142.148.123 protocol=tcp sport=27693 dport=12558 pattern: 1 dst 0.142.148.123", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 27693, "protocol": 6, "streamName": "meraki", "clientIP": "232.33.227.241", "serverIP": "0.142.148.123" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658148027.758617172 NORDC_MX400_1 flows src=232.33.227.241 dst=0.142.148.123 protocol=tcp sport=27693 dport=12558 pattern: 1 dst 0.142.148.123
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658148027.758617172 NORDC_MX400_1 flows src=232.33.227.241 dst=0.142.148.123 protocol=tcp sport=27693 dport=12558 pattern: 1 dst 0.142.148.123
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 12558 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 27693 protocol: 6 streamName: meraki clientIP: 232.33.227.241 serverIP: 0.142.148.123
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658148027.758617172 NORDC_MX400_1 flows src=5.42.49.255 dst=1.143.203.8 protocol=tcp sport=27693 dport=12558 pattern: 1 dst 1.143.203.8
{ "senderhost": "192.168.2.250", "serverport": 12558, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658148027.758617172 NORDC_MX400_1 flows src=5.42.49.255 dst=1.143.203.8 protocol=tcp sport=27693 dport=12558 pattern: 1 dst 1.143.203.8", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 27693, "protocol": 6, "streamName": "meraki", "clientIP": "5.42.49.255", "serverIP": "1.143.203.8" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658148027.758617172 NORDC_MX400_1 flows src=5.42.49.255 dst=1.143.203.8 protocol=tcp sport=27693 dport=12558 pattern: 1 dst 1.143.203.8
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658148027.758617172 NORDC_MX400_1 flows src=5.42.49.255 dst=1.143.203.8 protocol=tcp sport=27693 dport=12558 pattern: 1 dst 1.143.203.8
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 12558 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 27693 protocol: 6 streamName: meraki clientIP: 5.42.49.255 serverIP: 1.143.203.8
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658148027.758617172 NORDC_MX400_1 flows src=235.70.137.222 dst=127.243.207.188 protocol=tcp sport=27693 dport=12558 pattern: 1 dst 127.243.207.188
{ "senderhost": "192.168.2.250", "serverport": 12558, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658148027.758617172 NORDC_MX400_1 flows src=235.70.137.222 dst=127.243.207.188 protocol=tcp sport=27693 dport=12558 pattern: 1 dst 127.243.207.188", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 27693, "protocol": 6, "streamName": "meraki", "clientIP": "235.70.137.222", "serverIP": "127.243.207.188" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658148027.758617172 NORDC_MX400_1 flows src=235.70.137.222 dst=127.243.207.188 protocol=tcp sport=27693 dport=12558 pattern: 1 dst 127.243.207.188
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658148027.758617172 NORDC_MX400_1 flows src=235.70.137.222 dst=127.243.207.188 protocol=tcp sport=27693 dport=12558 pattern: 1 dst 127.243.207.188
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 12558 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 27693 protocol: 6 streamName: meraki clientIP: 235.70.137.222 serverIP: 127.243.207.188
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658148027.758617172 NORDC_MX400_1 flows src=1.110.157.155 dst=140.69.129.159 protocol=tcp sport=27693 dport=12558 pattern: 1 dst 140.69.129.159
{ "senderhost": "192.168.2.250", "serverport": 12558, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658148027.758617172 NORDC_MX400_1 flows src=1.110.157.155 dst=140.69.129.159 protocol=tcp sport=27693 dport=12558 pattern: 1 dst 140.69.129.159", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 27693, "protocol": 6, "streamName": "meraki", "clientIP": "1.110.157.155", "serverIP": "140.69.129.159" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658148027.758617172 NORDC_MX400_1 flows src=1.110.157.155 dst=140.69.129.159 protocol=tcp sport=27693 dport=12558 pattern: 1 dst 140.69.129.159
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658148027.758617172 NORDC_MX400_1 flows src=1.110.157.155 dst=140.69.129.159 protocol=tcp sport=27693 dport=12558 pattern: 1 dst 140.69.129.159
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 12558 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 27693 protocol: 6 streamName: meraki clientIP: 1.110.157.155 serverIP: 140.69.129.159
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658148014.342855854 NORDC_MX400_1 flows src=179.107.192.121 dst=182.85.107.235 protocol=tcp sport=53164 dport=23375 pattern: 1 dst 182.85.107.235
{ "senderhost": "192.168.2.250", "serverport": 23375, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658148014.342855854 NORDC_MX400_1 flows src=179.107.192.121 dst=182.85.107.235 protocol=tcp sport=53164 dport=23375 pattern: 1 dst 182.85.107.235", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 53164, "protocol": 6, "streamName": "meraki", "clientIP": "179.107.192.121", "serverIP": "182.85.107.235" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658148014.342855854 NORDC_MX400_1 flows src=179.107.192.121 dst=182.85.107.235 protocol=tcp sport=53164 dport=23375 pattern: 1 dst 182.85.107.235
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658148014.342855854 NORDC_MX400_1 flows src=179.107.192.121 dst=182.85.107.235 protocol=tcp sport=53164 dport=23375 pattern: 1 dst 182.85.107.235
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 23375 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 53164 protocol: 6 streamName: meraki clientIP: 179.107.192.121 serverIP: 182.85.107.235
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658148014.342855854 NORDC_MX400_1 flows src=103.99.45.240 dst=214.168.9.166 protocol=tcp sport=53164 dport=23375 pattern: 1 dst 214.168.9.166
{ "senderhost": "192.168.2.250", "serverport": 23375, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658148014.342855854 NORDC_MX400_1 flows src=103.99.45.240 dst=214.168.9.166 protocol=tcp sport=53164 dport=23375 pattern: 1 dst 214.168.9.166", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 53164, "protocol": 6, "streamName": "meraki", "clientIP": "103.99.45.240", "serverIP": "214.168.9.166" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658148014.342855854 NORDC_MX400_1 flows src=103.99.45.240 dst=214.168.9.166 protocol=tcp sport=53164 dport=23375 pattern: 1 dst 214.168.9.166
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658148014.342855854 NORDC_MX400_1 flows src=103.99.45.240 dst=214.168.9.166 protocol=tcp sport=53164 dport=23375 pattern: 1 dst 214.168.9.166
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 23375 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 53164 protocol: 6 streamName: meraki clientIP: 103.99.45.240 serverIP: 214.168.9.166
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658148014.342855854 NORDC_MX400_1 flows src=120.138.168.198 dst=160.13.68.57 protocol=tcp sport=53164 dport=23375 pattern: 1 dst 160.13.68.57
{ "senderhost": "192.168.2.250", "serverport": 23375, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658148014.342855854 NORDC_MX400_1 flows src=120.138.168.198 dst=160.13.68.57 protocol=tcp sport=53164 dport=23375 pattern: 1 dst 160.13.68.57", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 53164, "protocol": 6, "streamName": "meraki", "clientIP": "120.138.168.198", "serverIP": "160.13.68.57" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658148014.342855854 NORDC_MX400_1 flows src=120.138.168.198 dst=160.13.68.57 protocol=tcp sport=53164 dport=23375 pattern: 1 dst 160.13.68.57
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658148014.342855854 NORDC_MX400_1 flows src=120.138.168.198 dst=160.13.68.57 protocol=tcp sport=53164 dport=23375 pattern: 1 dst 160.13.68.57
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 23375 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 53164 protocol: 6 streamName: meraki clientIP: 120.138.168.198 serverIP: 160.13.68.57
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658148014.342855854 NORDC_MX400_1 flows src=196.134.137.19 dst=52.163.186.37 protocol=tcp sport=53164 dport=23375 pattern: 1 dst 52.163.186.37
{ "senderhost": "192.168.2.250", "serverport": 23375, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658148014.342855854 NORDC_MX400_1 flows src=196.134.137.19 dst=52.163.186.37 protocol=tcp sport=53164 dport=23375 pattern: 1 dst 52.163.186.37", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 53164, "protocol": 6, "streamName": "meraki", "clientIP": "196.134.137.19", "serverIP": "52.163.186.37" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658148014.342855854 NORDC_MX400_1 flows src=196.134.137.19 dst=52.163.186.37 protocol=tcp sport=53164 dport=23375 pattern: 1 dst 52.163.186.37
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658148014.342855854 NORDC_MX400_1 flows src=196.134.137.19 dst=52.163.186.37 protocol=tcp sport=53164 dport=23375 pattern: 1 dst 52.163.186.37
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 23375 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 53164 protocol: 6 streamName: meraki clientIP: 196.134.137.19 serverIP: 52.163.186.37
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658148034.468129517 NORDC_MX400_1 flows src=96.68.202.71 dst=115.68.16.92 protocol=tcp sport=20091 dport=10002 pattern: 1 dst 115.68.16.92
{ "senderhost": "192.168.2.250", "serverport": 10002, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658148034.468129517 NORDC_MX400_1 flows src=96.68.202.71 dst=115.68.16.92 protocol=tcp sport=20091 dport=10002 pattern: 1 dst 115.68.16.92", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 20091, "protocol": 6, "streamName": "meraki", "clientIP": "96.68.202.71", "serverIP": "115.68.16.92" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658148034.468129517 NORDC_MX400_1 flows src=96.68.202.71 dst=115.68.16.92 protocol=tcp sport=20091 dport=10002 pattern: 1 dst 115.68.16.92
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658148034.468129517 NORDC_MX400_1 flows src=96.68.202.71 dst=115.68.16.92 protocol=tcp sport=20091 dport=10002 pattern: 1 dst 115.68.16.92
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 10002 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 20091 protocol: 6 streamName: meraki clientIP: 96.68.202.71 serverIP: 115.68.16.92
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658148034.468129517 NORDC_MX400_1 flows src=32.157.244.90 dst=225.209.177.93 protocol=tcp sport=20091 dport=10002 pattern: 1 dst 225.209.177.93
{ "senderhost": "192.168.2.250", "serverport": 10002, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658148034.468129517 NORDC_MX400_1 flows src=32.157.244.90 dst=225.209.177.93 protocol=tcp sport=20091 dport=10002 pattern: 1 dst 225.209.177.93", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 20091, "protocol": 6, "streamName": "meraki", "clientIP": "32.157.244.90", "serverIP": "225.209.177.93" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658148034.468129517 NORDC_MX400_1 flows src=32.157.244.90 dst=225.209.177.93 protocol=tcp sport=20091 dport=10002 pattern: 1 dst 225.209.177.93
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658148034.468129517 NORDC_MX400_1 flows src=32.157.244.90 dst=225.209.177.93 protocol=tcp sport=20091 dport=10002 pattern: 1 dst 225.209.177.93
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 10002 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 20091 protocol: 6 streamName: meraki clientIP: 32.157.244.90 serverIP: 225.209.177.93
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658148034.468129517 NORDC_MX400_1 flows src=230.80.148.44 dst=49.245.97.170 protocol=tcp sport=20091 dport=10002 pattern: 1 dst 49.245.97.170
{ "senderhost": "192.168.2.250", "serverport": 10002, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658148034.468129517 NORDC_MX400_1 flows src=230.80.148.44 dst=49.245.97.170 protocol=tcp sport=20091 dport=10002 pattern: 1 dst 49.245.97.170", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 20091, "protocol": 6, "streamName": "meraki", "clientIP": "230.80.148.44", "serverIP": "49.245.97.170" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658148034.468129517 NORDC_MX400_1 flows src=230.80.148.44 dst=49.245.97.170 protocol=tcp sport=20091 dport=10002 pattern: 1 dst 49.245.97.170
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658148034.468129517 NORDC_MX400_1 flows src=230.80.148.44 dst=49.245.97.170 protocol=tcp sport=20091 dport=10002 pattern: 1 dst 49.245.97.170
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 10002 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 20091 protocol: 6 streamName: meraki clientIP: 230.80.148.44 serverIP: 49.245.97.170
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658148034.468129517 NORDC_MX400_1 flows src=10.47.132.140 dst=40.64.150.38 protocol=tcp sport=20091 dport=10002 pattern: 1 dst 40.64.150.38
{ "senderhost": "192.168.2.250", "serverport": 10002, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658148034.468129517 NORDC_MX400_1 flows src=10.47.132.140 dst=40.64.150.38 protocol=tcp sport=20091 dport=10002 pattern: 1 dst 40.64.150.38", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 20091, "protocol": 6, "streamName": "meraki", "clientIP": "10.47.132.140", "serverIP": "40.64.150.38" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658148034.468129517 NORDC_MX400_1 flows src=10.47.132.140 dst=40.64.150.38 protocol=tcp sport=20091 dport=10002 pattern: 1 dst 40.64.150.38
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658148034.468129517 NORDC_MX400_1 flows src=10.47.132.140 dst=40.64.150.38 protocol=tcp sport=20091 dport=10002 pattern: 1 dst 40.64.150.38
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 10002 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 20091 protocol: 6 streamName: meraki clientIP: 10.47.132.140 serverIP: 40.64.150.38
Explain this syslog message
<134>Original Address=75.146.93.165 1 1658148285.473393706 M61_MX67C_Savannah flows src=126.150.217.198 dst=66.132.94.107 protocol=udp sport=6004 dport=38073 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 6004, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1658148285.473393706 M61_MX67C_Savannah flows src=126.150.217.198 dst=66.132.94.107 protocol=udp sport=6004 dport=38073 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 38073, "protocol": 17, "streamName": "meraki", "clientIP": "66.132.94.107", "serverIP": "126.150.217.198" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1658148285.473393706 M61_MX67C_Savannah flows src=126.150.217.198 dst=66.132.94.107 protocol=udp sport=6004 dport=38073 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1658148285.473393706 M61_MX67C_Savannah flows src=126.150.217.198 dst=66.132.94.107 protocol=udp sport=6004 dport=38073 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 6004 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 38073 protocol: 17 streamName: meraki clientIP: 66.132.94.107 serverIP: 126.150.217.198
Explain this syslog message
<134>Original Address=75.146.93.165 1 1658148285.473393706 M61_MX67C_Savannah flows src=68.47.181.216 dst=205.167.44.176 protocol=udp sport=6004 dport=38073 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 6004, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1658148285.473393706 M61_MX67C_Savannah flows src=68.47.181.216 dst=205.167.44.176 protocol=udp sport=6004 dport=38073 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 38073, "protocol": 17, "streamName": "meraki", "clientIP": "205.167.44.176", "serverIP": "68.47.181.216" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1658148285.473393706 M61_MX67C_Savannah flows src=68.47.181.216 dst=205.167.44.176 protocol=udp sport=6004 dport=38073 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1658148285.473393706 M61_MX67C_Savannah flows src=68.47.181.216 dst=205.167.44.176 protocol=udp sport=6004 dport=38073 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 6004 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 38073 protocol: 17 streamName: meraki clientIP: 205.167.44.176 serverIP: 68.47.181.216
Explain this syslog message
<134>Original Address=75.146.93.165 1 1658148285.473466466 M61_MX67C_Savannah flows src=25.95.218.154 dst=56.217.136.24 protocol=udp sport=6004 dport=38073 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 6004, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1658148285.473466466 M61_MX67C_Savannah flows src=25.95.218.154 dst=56.217.136.24 protocol=udp sport=6004 dport=38073 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 38073, "protocol": 17, "streamName": "meraki", "clientIP": "56.217.136.24", "serverIP": "25.95.218.154" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1658148285.473466466 M61_MX67C_Savannah flows src=25.95.218.154 dst=56.217.136.24 protocol=udp sport=6004 dport=38073 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1658148285.473466466 M61_MX67C_Savannah flows src=25.95.218.154 dst=56.217.136.24 protocol=udp sport=6004 dport=38073 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 6004 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 38073 protocol: 17 streamName: meraki clientIP: 56.217.136.24 serverIP: 25.95.218.154
Explain this syslog message
<134>Original Address=75.146.93.165 1 1658148285.473466466 M61_MX67C_Savannah flows src=253.108.8.163 dst=129.35.198.88 protocol=udp sport=6004 dport=38073 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 6004, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1658148285.473466466 M61_MX67C_Savannah flows src=253.108.8.163 dst=129.35.198.88 protocol=udp sport=6004 dport=38073 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 38073, "protocol": 17, "streamName": "meraki", "clientIP": "129.35.198.88", "serverIP": "253.108.8.163" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1658148285.473466466 M61_MX67C_Savannah flows src=253.108.8.163 dst=129.35.198.88 protocol=udp sport=6004 dport=38073 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1658148285.473466466 M61_MX67C_Savannah flows src=253.108.8.163 dst=129.35.198.88 protocol=udp sport=6004 dport=38073 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 6004 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 38073 protocol: 17 streamName: meraki clientIP: 129.35.198.88 serverIP: 253.108.8.163
Explain this syslog message
<134>Original Address=75.146.93.165 1 1658148285.473393706 M61_MX67C_Savannah flows src=145.66.171.9 dst=184.138.110.226 protocol=udp sport=6004 dport=38073 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 6004, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1658148285.473393706 M61_MX67C_Savannah flows src=145.66.171.9 dst=184.138.110.226 protocol=udp sport=6004 dport=38073 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 38073, "protocol": 17, "streamName": "meraki", "clientIP": "184.138.110.226", "serverIP": "145.66.171.9" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1658148285.473393706 M61_MX67C_Savannah flows src=145.66.171.9 dst=184.138.110.226 protocol=udp sport=6004 dport=38073 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1658148285.473393706 M61_MX67C_Savannah flows src=145.66.171.9 dst=184.138.110.226 protocol=udp sport=6004 dport=38073 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 6004 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 38073 protocol: 17 streamName: meraki clientIP: 184.138.110.226 serverIP: 145.66.171.9
Explain this syslog message
<134>Original Address=75.146.93.165 1 1658148285.473393706 M61_MX67C_Savannah flows src=54.208.29.12 dst=56.40.147.112 protocol=udp sport=6004 dport=38073 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 6004, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1658148285.473393706 M61_MX67C_Savannah flows src=54.208.29.12 dst=56.40.147.112 protocol=udp sport=6004 dport=38073 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 38073, "protocol": 17, "streamName": "meraki", "clientIP": "56.40.147.112", "serverIP": "54.208.29.12" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1658148285.473393706 M61_MX67C_Savannah flows src=54.208.29.12 dst=56.40.147.112 protocol=udp sport=6004 dport=38073 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1658148285.473393706 M61_MX67C_Savannah flows src=54.208.29.12 dst=56.40.147.112 protocol=udp sport=6004 dport=38073 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 6004 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 38073 protocol: 17 streamName: meraki clientIP: 56.40.147.112 serverIP: 54.208.29.12
Explain this syslog message
<134>Original Address=75.146.93.165 1 1658148285.473466466 M61_MX67C_Savannah flows src=236.175.221.68 dst=43.83.121.31 protocol=udp sport=6004 dport=38073 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 6004, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1658148285.473466466 M61_MX67C_Savannah flows src=236.175.221.68 dst=43.83.121.31 protocol=udp sport=6004 dport=38073 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 38073, "protocol": 17, "streamName": "meraki", "clientIP": "43.83.121.31", "serverIP": "236.175.221.68" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1658148285.473466466 M61_MX67C_Savannah flows src=236.175.221.68 dst=43.83.121.31 protocol=udp sport=6004 dport=38073 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1658148285.473466466 M61_MX67C_Savannah flows src=236.175.221.68 dst=43.83.121.31 protocol=udp sport=6004 dport=38073 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 6004 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 38073 protocol: 17 streamName: meraki clientIP: 43.83.121.31 serverIP: 236.175.221.68
Explain this syslog message
<134>Original Address=75.146.93.165 1 1658148285.473466466 M61_MX67C_Savannah flows src=182.143.230.41 dst=144.181.95.252 protocol=udp sport=6004 dport=38073 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 6004, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1658148285.473466466 M61_MX67C_Savannah flows src=182.143.230.41 dst=144.181.95.252 protocol=udp sport=6004 dport=38073 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 38073, "protocol": 17, "streamName": "meraki", "clientIP": "144.181.95.252", "serverIP": "182.143.230.41" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1658148285.473466466 M61_MX67C_Savannah flows src=182.143.230.41 dst=144.181.95.252 protocol=udp sport=6004 dport=38073 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1658148285.473466466 M61_MX67C_Savannah flows src=182.143.230.41 dst=144.181.95.252 protocol=udp sport=6004 dport=38073 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 6004 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 38073 protocol: 17 streamName: meraki clientIP: 144.181.95.252 serverIP: 182.143.230.41
Explain this syslog message
<134>Original Address=75.146.93.165 1 1658148300.330280466 M61_MX67C_Savannah flows src=27.178.2.243 dst=148.68.253.104 protocol=udp sport=5967 dport=28947 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5967, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1658148300.330280466 M61_MX67C_Savannah flows src=27.178.2.243 dst=148.68.253.104 protocol=udp sport=5967 dport=28947 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 28947, "protocol": 17, "streamName": "meraki", "clientIP": "148.68.253.104", "serverIP": "27.178.2.243" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1658148300.330280466 M61_MX67C_Savannah flows src=27.178.2.243 dst=148.68.253.104 protocol=udp sport=5967 dport=28947 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1658148300.330280466 M61_MX67C_Savannah flows src=27.178.2.243 dst=148.68.253.104 protocol=udp sport=5967 dport=28947 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5967 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 28947 protocol: 17 streamName: meraki clientIP: 148.68.253.104 serverIP: 27.178.2.243
Explain this syslog message
<134>Original Address=75.146.93.165 1 1658148300.330280466 M61_MX67C_Savannah flows src=226.127.176.151 dst=10.139.253.136 protocol=udp sport=5967 dport=28947 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5967, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1658148300.330280466 M61_MX67C_Savannah flows src=226.127.176.151 dst=10.139.253.136 protocol=udp sport=5967 dport=28947 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 28947, "protocol": 17, "streamName": "meraki", "clientIP": "10.139.253.136", "serverIP": "226.127.176.151" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1658148300.330280466 M61_MX67C_Savannah flows src=226.127.176.151 dst=10.139.253.136 protocol=udp sport=5967 dport=28947 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1658148300.330280466 M61_MX67C_Savannah flows src=226.127.176.151 dst=10.139.253.136 protocol=udp sport=5967 dport=28947 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5967 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 28947 protocol: 17 streamName: meraki clientIP: 10.139.253.136 serverIP: 226.127.176.151
Explain this syslog message
<134>Original Address=75.146.93.165 1 1658148300.330280466 M61_MX67C_Savannah flows src=157.106.228.61 dst=128.0.46.41 protocol=udp sport=5967 dport=28947 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5967, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1658148300.330280466 M61_MX67C_Savannah flows src=157.106.228.61 dst=128.0.46.41 protocol=udp sport=5967 dport=28947 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 28947, "protocol": 17, "streamName": "meraki", "clientIP": "128.0.46.41", "serverIP": "157.106.228.61" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1658148300.330280466 M61_MX67C_Savannah flows src=157.106.228.61 dst=128.0.46.41 protocol=udp sport=5967 dport=28947 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1658148300.330280466 M61_MX67C_Savannah flows src=157.106.228.61 dst=128.0.46.41 protocol=udp sport=5967 dport=28947 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5967 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 28947 protocol: 17 streamName: meraki clientIP: 128.0.46.41 serverIP: 157.106.228.61
Explain this syslog message
<134>Original Address=75.146.93.165 1 1658148300.330280466 M61_MX67C_Savannah flows src=10.222.100.197 dst=187.227.176.77 protocol=udp sport=5967 dport=28947 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5967, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1658148300.330280466 M61_MX67C_Savannah flows src=10.222.100.197 dst=187.227.176.77 protocol=udp sport=5967 dport=28947 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 28947, "protocol": 17, "streamName": "meraki", "clientIP": "187.227.176.77", "serverIP": "10.222.100.197" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1658148300.330280466 M61_MX67C_Savannah flows src=10.222.100.197 dst=187.227.176.77 protocol=udp sport=5967 dport=28947 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1658148300.330280466 M61_MX67C_Savannah flows src=10.222.100.197 dst=187.227.176.77 protocol=udp sport=5967 dport=28947 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5967 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 28947 protocol: 17 streamName: meraki clientIP: 187.227.176.77 serverIP: 10.222.100.197
Explain this syslog message
<134>Original Address=143.196.242.57 1 1658148301.911582759 M64_MX67C_Augusta flows src=225.77.248.206 dst=143.196.242.57 protocol=udp sport=5976 dport=47643 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5976, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=143.196.242.57 1 1658148301.911582759 M64_MX67C_Augusta flows src=225.77.248.206 dst=143.196.242.57 protocol=udp sport=5976 dport=47643 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 47643, "protocol": 17, "streamName": "meraki", "clientIP": "143.196.242.57", "serverIP": "225.77.248.206" }
Create a JSON artifact from the message
<134>Original Address=143.196.242.57 1 1658148301.911582759 M64_MX67C_Augusta flows src=225.77.248.206 dst=143.196.242.57 protocol=udp sport=5976 dport=47643 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=143.196.242.57 1 1658148301.911582759 M64_MX67C_Augusta flows src=225.77.248.206 dst=143.196.242.57 protocol=udp sport=5976 dport=47643 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5976 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 47643 protocol: 17 streamName: meraki clientIP: 143.196.242.57 serverIP: 225.77.248.206
Explain this syslog message
<134>Original Address=139.145.161.165 1 1658148301.911582759 M64_MX67C_Augusta flows src=202.229.179.85 dst=139.145.161.165 protocol=udp sport=5976 dport=47643 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5976, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=139.145.161.165 1 1658148301.911582759 M64_MX67C_Augusta flows src=202.229.179.85 dst=139.145.161.165 protocol=udp sport=5976 dport=47643 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 47643, "protocol": 17, "streamName": "meraki", "clientIP": "139.145.161.165", "serverIP": "202.229.179.85" }
Create a JSON artifact from the message
<134>Original Address=139.145.161.165 1 1658148301.911582759 M64_MX67C_Augusta flows src=202.229.179.85 dst=139.145.161.165 protocol=udp sport=5976 dport=47643 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=139.145.161.165 1 1658148301.911582759 M64_MX67C_Augusta flows src=202.229.179.85 dst=139.145.161.165 protocol=udp sport=5976 dport=47643 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5976 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 47643 protocol: 17 streamName: meraki clientIP: 139.145.161.165 serverIP: 202.229.179.85
Explain this syslog message
<134>Original Address=94.99.20.156 1 1658148301.941441239 M64_MX67C_Augusta flows src=133.53.98.154 dst=94.99.20.156 protocol=udp sport=5976 dport=38220 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5976, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=94.99.20.156 1 1658148301.941441239 M64_MX67C_Augusta flows src=133.53.98.154 dst=94.99.20.156 protocol=udp sport=5976 dport=38220 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 38220, "protocol": 17, "streamName": "meraki", "clientIP": "94.99.20.156", "serverIP": "133.53.98.154" }
Create a JSON artifact from the message
<134>Original Address=94.99.20.156 1 1658148301.941441239 M64_MX67C_Augusta flows src=133.53.98.154 dst=94.99.20.156 protocol=udp sport=5976 dport=38220 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=94.99.20.156 1 1658148301.941441239 M64_MX67C_Augusta flows src=133.53.98.154 dst=94.99.20.156 protocol=udp sport=5976 dport=38220 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5976 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 38220 protocol: 17 streamName: meraki clientIP: 94.99.20.156 serverIP: 133.53.98.154
Explain this syslog message
<134>Original Address=194.254.146.69 1 1658148301.941441239 M64_MX67C_Augusta flows src=152.121.12.82 dst=194.254.146.69 protocol=udp sport=5976 dport=38220 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5976, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=194.254.146.69 1 1658148301.941441239 M64_MX67C_Augusta flows src=152.121.12.82 dst=194.254.146.69 protocol=udp sport=5976 dport=38220 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 38220, "protocol": 17, "streamName": "meraki", "clientIP": "194.254.146.69", "serverIP": "152.121.12.82" }
Create a JSON artifact from the message
<134>Original Address=194.254.146.69 1 1658148301.941441239 M64_MX67C_Augusta flows src=152.121.12.82 dst=194.254.146.69 protocol=udp sport=5976 dport=38220 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=194.254.146.69 1 1658148301.941441239 M64_MX67C_Augusta flows src=152.121.12.82 dst=194.254.146.69 protocol=udp sport=5976 dport=38220 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5976 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 38220 protocol: 17 streamName: meraki clientIP: 194.254.146.69 serverIP: 152.121.12.82
Explain this syslog message
<134>Original Address=13.28.212.217 1 1658148301.964343199 M64_MX67C_Augusta flows src=254.23.60.138 dst=13.28.212.217 protocol=udp sport=5976 dport=63612 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5976, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=13.28.212.217 1 1658148301.964343199 M64_MX67C_Augusta flows src=254.23.60.138 dst=13.28.212.217 protocol=udp sport=5976 dport=63612 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 63612, "protocol": 17, "streamName": "meraki", "clientIP": "13.28.212.217", "serverIP": "254.23.60.138" }
Create a JSON artifact from the message
<134>Original Address=13.28.212.217 1 1658148301.964343199 M64_MX67C_Augusta flows src=254.23.60.138 dst=13.28.212.217 protocol=udp sport=5976 dport=63612 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=13.28.212.217 1 1658148301.964343199 M64_MX67C_Augusta flows src=254.23.60.138 dst=13.28.212.217 protocol=udp sport=5976 dport=63612 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5976 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 63612 protocol: 17 streamName: meraki clientIP: 13.28.212.217 serverIP: 254.23.60.138
Explain this syslog message
<134>Original Address=229.139.53.117 1 1658148301.964343199 M64_MX67C_Augusta flows src=243.66.158.242 dst=229.139.53.117 protocol=udp sport=5976 dport=63612 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5976, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=229.139.53.117 1 1658148301.964343199 M64_MX67C_Augusta flows src=243.66.158.242 dst=229.139.53.117 protocol=udp sport=5976 dport=63612 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 63612, "protocol": 17, "streamName": "meraki", "clientIP": "229.139.53.117", "serverIP": "243.66.158.242" }
Create a JSON artifact from the message
<134>Original Address=229.139.53.117 1 1658148301.964343199 M64_MX67C_Augusta flows src=243.66.158.242 dst=229.139.53.117 protocol=udp sport=5976 dport=63612 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=229.139.53.117 1 1658148301.964343199 M64_MX67C_Augusta flows src=243.66.158.242 dst=229.139.53.117 protocol=udp sport=5976 dport=63612 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5976 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 63612 protocol: 17 streamName: meraki clientIP: 229.139.53.117 serverIP: 243.66.158.242
Explain this syslog message