input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<134>Original Address=146.248.194.202 1 1658148302.040706919 M64_MX67C_Augusta flows src=50.3.213.3 dst=146.248.194.202 protocol=udp sport=5976 dport=54765 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5976,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=146.248.194.202 1 1658148302.040706919 M64_MX67C_Augusta flows src=50.3.213.3 dst=146.248.194.202 protocol=udp sport=5976 dport=54765 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 54765,
"protocol": 17,
"streamName": "meraki",
"clientIP": "146.248.194.202",
"serverIP": "50.3.213.3"
}
|
Create a JSON artifact from the message
|
<134>Original Address=146.248.194.202 1 1658148302.040706919 M64_MX67C_Augusta flows src=50.3.213.3 dst=146.248.194.202 protocol=udp sport=5976 dport=54765 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=146.248.194.202 1 1658148302.040706919 M64_MX67C_Augusta flows src=50.3.213.3 dst=146.248.194.202 protocol=udp sport=5976 dport=54765 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5976
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 54765
protocol: 17
streamName: meraki
clientIP: 146.248.194.202
serverIP: 50.3.213.3
|
Explain this syslog message
|
<134>Original Address=29.14.154.145 1 1658148302.040706919 M64_MX67C_Augusta flows src=46.131.61.163 dst=29.14.154.145 protocol=udp sport=5976 dport=54765 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5976,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=29.14.154.145 1 1658148302.040706919 M64_MX67C_Augusta flows src=46.131.61.163 dst=29.14.154.145 protocol=udp sport=5976 dport=54765 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 54765,
"protocol": 17,
"streamName": "meraki",
"clientIP": "29.14.154.145",
"serverIP": "46.131.61.163"
}
|
Create a JSON artifact from the message
|
<134>Original Address=29.14.154.145 1 1658148302.040706919 M64_MX67C_Augusta flows src=46.131.61.163 dst=29.14.154.145 protocol=udp sport=5976 dport=54765 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=29.14.154.145 1 1658148302.040706919 M64_MX67C_Augusta flows src=46.131.61.163 dst=29.14.154.145 protocol=udp sport=5976 dport=54765 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5976
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 54765
protocol: 17
streamName: meraki
clientIP: 29.14.154.145
serverIP: 46.131.61.163
|
Explain this syslog message
|
<134>Original Address=41.164.166.157 1 1658148302.104143639 M64_MX67C_Augusta flows src=45.30.139.225 dst=41.164.166.157 protocol=udp sport=5976 dport=31263 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5976,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=41.164.166.157 1 1658148302.104143639 M64_MX67C_Augusta flows src=45.30.139.225 dst=41.164.166.157 protocol=udp sport=5976 dport=31263 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 31263,
"protocol": 17,
"streamName": "meraki",
"clientIP": "41.164.166.157",
"serverIP": "45.30.139.225"
}
|
Create a JSON artifact from the message
|
<134>Original Address=41.164.166.157 1 1658148302.104143639 M64_MX67C_Augusta flows src=45.30.139.225 dst=41.164.166.157 protocol=udp sport=5976 dport=31263 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=41.164.166.157 1 1658148302.104143639 M64_MX67C_Augusta flows src=45.30.139.225 dst=41.164.166.157 protocol=udp sport=5976 dport=31263 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5976
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 31263
protocol: 17
streamName: meraki
clientIP: 41.164.166.157
serverIP: 45.30.139.225
|
Explain this syslog message
|
<134>Original Address=170.98.37.177 1 1658148302.104143639 M64_MX67C_Augusta flows src=135.214.250.199 dst=170.98.37.177 protocol=udp sport=5976 dport=31263 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5976,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=170.98.37.177 1 1658148302.104143639 M64_MX67C_Augusta flows src=135.214.250.199 dst=170.98.37.177 protocol=udp sport=5976 dport=31263 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 31263,
"protocol": 17,
"streamName": "meraki",
"clientIP": "170.98.37.177",
"serverIP": "135.214.250.199"
}
|
Create a JSON artifact from the message
|
<134>Original Address=170.98.37.177 1 1658148302.104143639 M64_MX67C_Augusta flows src=135.214.250.199 dst=170.98.37.177 protocol=udp sport=5976 dport=31263 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=170.98.37.177 1 1658148302.104143639 M64_MX67C_Augusta flows src=135.214.250.199 dst=170.98.37.177 protocol=udp sport=5976 dport=31263 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5976
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 31263
protocol: 17
streamName: meraki
clientIP: 170.98.37.177
serverIP: 135.214.250.199
|
Explain this syslog message
|
<134>Original Address=198.166.32.251 1 1658148301.773483599 M64_MX67C_Augusta flows src=157.37.95.134 dst=198.166.32.251 protocol=udp sport=5976 dport=9559 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5976,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=198.166.32.251 1 1658148301.773483599 M64_MX67C_Augusta flows src=157.37.95.134 dst=198.166.32.251 protocol=udp sport=5976 dport=9559 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 9559,
"protocol": 17,
"streamName": "meraki",
"clientIP": "198.166.32.251",
"serverIP": "157.37.95.134"
}
|
Create a JSON artifact from the message
|
<134>Original Address=198.166.32.251 1 1658148301.773483599 M64_MX67C_Augusta flows src=157.37.95.134 dst=198.166.32.251 protocol=udp sport=5976 dport=9559 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=198.166.32.251 1 1658148301.773483599 M64_MX67C_Augusta flows src=157.37.95.134 dst=198.166.32.251 protocol=udp sport=5976 dport=9559 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5976
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 9559
protocol: 17
streamName: meraki
clientIP: 198.166.32.251
serverIP: 157.37.95.134
|
Explain this syslog message
|
<134>Original Address=18.225.164.112 1 1658148301.773483599 M64_MX67C_Augusta flows src=139.159.104.70 dst=18.225.164.112 protocol=udp sport=5976 dport=9559 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5976,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=18.225.164.112 1 1658148301.773483599 M64_MX67C_Augusta flows src=139.159.104.70 dst=18.225.164.112 protocol=udp sport=5976 dport=9559 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 9559,
"protocol": 17,
"streamName": "meraki",
"clientIP": "18.225.164.112",
"serverIP": "139.159.104.70"
}
|
Create a JSON artifact from the message
|
<134>Original Address=18.225.164.112 1 1658148301.773483599 M64_MX67C_Augusta flows src=139.159.104.70 dst=18.225.164.112 protocol=udp sport=5976 dport=9559 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=18.225.164.112 1 1658148301.773483599 M64_MX67C_Augusta flows src=139.159.104.70 dst=18.225.164.112 protocol=udp sport=5976 dport=9559 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5976
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 9559
protocol: 17
streamName: meraki
clientIP: 18.225.164.112
serverIP: 139.159.104.70
|
Explain this syslog message
|
<134>Original Address=92.178.71.75 1 1658148302.277751159 M64_MX67C_Augusta flows src=45.15.136.17 dst=92.178.71.75 protocol=udp sport=5976 dport=14410 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5976,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=92.178.71.75 1 1658148302.277751159 M64_MX67C_Augusta flows src=45.15.136.17 dst=92.178.71.75 protocol=udp sport=5976 dport=14410 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 14410,
"protocol": 17,
"streamName": "meraki",
"clientIP": "92.178.71.75",
"serverIP": "45.15.136.17"
}
|
Create a JSON artifact from the message
|
<134>Original Address=92.178.71.75 1 1658148302.277751159 M64_MX67C_Augusta flows src=45.15.136.17 dst=92.178.71.75 protocol=udp sport=5976 dport=14410 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=92.178.71.75 1 1658148302.277751159 M64_MX67C_Augusta flows src=45.15.136.17 dst=92.178.71.75 protocol=udp sport=5976 dport=14410 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5976
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 14410
protocol: 17
streamName: meraki
clientIP: 92.178.71.75
serverIP: 45.15.136.17
|
Explain this syslog message
|
<134>Original Address=224.15.159.99 1 1658148302.277751159 M64_MX67C_Augusta flows src=252.255.43.200 dst=224.15.159.99 protocol=udp sport=5976 dport=14410 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5976,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=224.15.159.99 1 1658148302.277751159 M64_MX67C_Augusta flows src=252.255.43.200 dst=224.15.159.99 protocol=udp sport=5976 dport=14410 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 14410,
"protocol": 17,
"streamName": "meraki",
"clientIP": "224.15.159.99",
"serverIP": "252.255.43.200"
}
|
Create a JSON artifact from the message
|
<134>Original Address=224.15.159.99 1 1658148302.277751159 M64_MX67C_Augusta flows src=252.255.43.200 dst=224.15.159.99 protocol=udp sport=5976 dport=14410 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=224.15.159.99 1 1658148302.277751159 M64_MX67C_Augusta flows src=252.255.43.200 dst=224.15.159.99 protocol=udp sport=5976 dport=14410 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5976
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 14410
protocol: 17
streamName: meraki
clientIP: 224.15.159.99
serverIP: 252.255.43.200
|
Explain this syslog message
|
<134>Original Address=84.204.248.225 1 1658148301.911582759 M64_MX67C_Augusta flows src=208.52.82.5 dst=84.204.248.225 protocol=udp sport=5976 dport=47643 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5976,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=84.204.248.225 1 1658148301.911582759 M64_MX67C_Augusta flows src=208.52.82.5 dst=84.204.248.225 protocol=udp sport=5976 dport=47643 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 47643,
"protocol": 17,
"streamName": "meraki",
"clientIP": "84.204.248.225",
"serverIP": "208.52.82.5"
}
|
Create a JSON artifact from the message
|
<134>Original Address=84.204.248.225 1 1658148301.911582759 M64_MX67C_Augusta flows src=208.52.82.5 dst=84.204.248.225 protocol=udp sport=5976 dport=47643 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=84.204.248.225 1 1658148301.911582759 M64_MX67C_Augusta flows src=208.52.82.5 dst=84.204.248.225 protocol=udp sport=5976 dport=47643 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5976
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 47643
protocol: 17
streamName: meraki
clientIP: 84.204.248.225
serverIP: 208.52.82.5
|
Explain this syslog message
|
<134>Original Address=5.216.224.78 1 1658148301.911582759 M64_MX67C_Augusta flows src=209.231.193.67 dst=5.216.224.78 protocol=udp sport=5976 dport=47643 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5976,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=5.216.224.78 1 1658148301.911582759 M64_MX67C_Augusta flows src=209.231.193.67 dst=5.216.224.78 protocol=udp sport=5976 dport=47643 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 47643,
"protocol": 17,
"streamName": "meraki",
"clientIP": "5.216.224.78",
"serverIP": "209.231.193.67"
}
|
Create a JSON artifact from the message
|
<134>Original Address=5.216.224.78 1 1658148301.911582759 M64_MX67C_Augusta flows src=209.231.193.67 dst=5.216.224.78 protocol=udp sport=5976 dport=47643 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=5.216.224.78 1 1658148301.911582759 M64_MX67C_Augusta flows src=209.231.193.67 dst=5.216.224.78 protocol=udp sport=5976 dport=47643 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5976
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 47643
protocol: 17
streamName: meraki
clientIP: 5.216.224.78
serverIP: 209.231.193.67
|
Explain this syslog message
|
<134>Original Address=235.254.23.171 1 1658148301.941441239 M64_MX67C_Augusta flows src=66.216.213.161 dst=235.254.23.171 protocol=udp sport=5976 dport=38220 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5976,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=235.254.23.171 1 1658148301.941441239 M64_MX67C_Augusta flows src=66.216.213.161 dst=235.254.23.171 protocol=udp sport=5976 dport=38220 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 38220,
"protocol": 17,
"streamName": "meraki",
"clientIP": "235.254.23.171",
"serverIP": "66.216.213.161"
}
|
Create a JSON artifact from the message
|
<134>Original Address=235.254.23.171 1 1658148301.941441239 M64_MX67C_Augusta flows src=66.216.213.161 dst=235.254.23.171 protocol=udp sport=5976 dport=38220 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=235.254.23.171 1 1658148301.941441239 M64_MX67C_Augusta flows src=66.216.213.161 dst=235.254.23.171 protocol=udp sport=5976 dport=38220 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5976
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 38220
protocol: 17
streamName: meraki
clientIP: 235.254.23.171
serverIP: 66.216.213.161
|
Explain this syslog message
|
<134>Original Address=127.137.49.5 1 1658148301.941441239 M64_MX67C_Augusta flows src=207.0.125.102 dst=127.137.49.5 protocol=udp sport=5976 dport=38220 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5976,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=127.137.49.5 1 1658148301.941441239 M64_MX67C_Augusta flows src=207.0.125.102 dst=127.137.49.5 protocol=udp sport=5976 dport=38220 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 38220,
"protocol": 17,
"streamName": "meraki",
"clientIP": "127.137.49.5",
"serverIP": "207.0.125.102"
}
|
Create a JSON artifact from the message
|
<134>Original Address=127.137.49.5 1 1658148301.941441239 M64_MX67C_Augusta flows src=207.0.125.102 dst=127.137.49.5 protocol=udp sport=5976 dport=38220 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=127.137.49.5 1 1658148301.941441239 M64_MX67C_Augusta flows src=207.0.125.102 dst=127.137.49.5 protocol=udp sport=5976 dport=38220 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5976
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 38220
protocol: 17
streamName: meraki
clientIP: 127.137.49.5
serverIP: 207.0.125.102
|
Explain this syslog message
|
<134>Original Address=25.246.173.42 1 1658148301.964343199 M64_MX67C_Augusta flows src=47.165.206.130 dst=25.246.173.42 protocol=udp sport=5976 dport=63612 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5976,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=25.246.173.42 1 1658148301.964343199 M64_MX67C_Augusta flows src=47.165.206.130 dst=25.246.173.42 protocol=udp sport=5976 dport=63612 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 63612,
"protocol": 17,
"streamName": "meraki",
"clientIP": "25.246.173.42",
"serverIP": "47.165.206.130"
}
|
Create a JSON artifact from the message
|
<134>Original Address=25.246.173.42 1 1658148301.964343199 M64_MX67C_Augusta flows src=47.165.206.130 dst=25.246.173.42 protocol=udp sport=5976 dport=63612 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=25.246.173.42 1 1658148301.964343199 M64_MX67C_Augusta flows src=47.165.206.130 dst=25.246.173.42 protocol=udp sport=5976 dport=63612 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5976
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 63612
protocol: 17
streamName: meraki
clientIP: 25.246.173.42
serverIP: 47.165.206.130
|
Explain this syslog message
|
<134>Original Address=126.35.69.185 1 1658148301.964343199 M64_MX67C_Augusta flows src=233.255.232.116 dst=126.35.69.185 protocol=udp sport=5976 dport=63612 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5976,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=126.35.69.185 1 1658148301.964343199 M64_MX67C_Augusta flows src=233.255.232.116 dst=126.35.69.185 protocol=udp sport=5976 dport=63612 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 63612,
"protocol": 17,
"streamName": "meraki",
"clientIP": "126.35.69.185",
"serverIP": "233.255.232.116"
}
|
Create a JSON artifact from the message
|
<134>Original Address=126.35.69.185 1 1658148301.964343199 M64_MX67C_Augusta flows src=233.255.232.116 dst=126.35.69.185 protocol=udp sport=5976 dport=63612 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=126.35.69.185 1 1658148301.964343199 M64_MX67C_Augusta flows src=233.255.232.116 dst=126.35.69.185 protocol=udp sport=5976 dport=63612 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5976
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 63612
protocol: 17
streamName: meraki
clientIP: 126.35.69.185
serverIP: 233.255.232.116
|
Explain this syslog message
|
<134>Original Address=118.174.174.9 1 1658148302.040706919 M64_MX67C_Augusta flows src=182.52.26.30 dst=118.174.174.9 protocol=udp sport=5976 dport=54765 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5976,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=118.174.174.9 1 1658148302.040706919 M64_MX67C_Augusta flows src=182.52.26.30 dst=118.174.174.9 protocol=udp sport=5976 dport=54765 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 54765,
"protocol": 17,
"streamName": "meraki",
"clientIP": "118.174.174.9",
"serverIP": "182.52.26.30"
}
|
Create a JSON artifact from the message
|
<134>Original Address=118.174.174.9 1 1658148302.040706919 M64_MX67C_Augusta flows src=182.52.26.30 dst=118.174.174.9 protocol=udp sport=5976 dport=54765 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=118.174.174.9 1 1658148302.040706919 M64_MX67C_Augusta flows src=182.52.26.30 dst=118.174.174.9 protocol=udp sport=5976 dport=54765 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5976
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 54765
protocol: 17
streamName: meraki
clientIP: 118.174.174.9
serverIP: 182.52.26.30
|
Explain this syslog message
|
<134>Original Address=254.140.175.40 1 1658148302.040706919 M64_MX67C_Augusta flows src=140.112.174.64 dst=254.140.175.40 protocol=udp sport=5976 dport=54765 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5976,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=254.140.175.40 1 1658148302.040706919 M64_MX67C_Augusta flows src=140.112.174.64 dst=254.140.175.40 protocol=udp sport=5976 dport=54765 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 54765,
"protocol": 17,
"streamName": "meraki",
"clientIP": "254.140.175.40",
"serverIP": "140.112.174.64"
}
|
Create a JSON artifact from the message
|
<134>Original Address=254.140.175.40 1 1658148302.040706919 M64_MX67C_Augusta flows src=140.112.174.64 dst=254.140.175.40 protocol=udp sport=5976 dport=54765 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=254.140.175.40 1 1658148302.040706919 M64_MX67C_Augusta flows src=140.112.174.64 dst=254.140.175.40 protocol=udp sport=5976 dport=54765 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5976
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 54765
protocol: 17
streamName: meraki
clientIP: 254.140.175.40
serverIP: 140.112.174.64
|
Explain this syslog message
|
<134>Original Address=23.150.158.130 1 1658148302.104143639 M64_MX67C_Augusta flows src=184.219.63.158 dst=23.150.158.130 protocol=udp sport=5976 dport=31263 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5976,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=23.150.158.130 1 1658148302.104143639 M64_MX67C_Augusta flows src=184.219.63.158 dst=23.150.158.130 protocol=udp sport=5976 dport=31263 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 31263,
"protocol": 17,
"streamName": "meraki",
"clientIP": "23.150.158.130",
"serverIP": "184.219.63.158"
}
|
Create a JSON artifact from the message
|
<134>Original Address=23.150.158.130 1 1658148302.104143639 M64_MX67C_Augusta flows src=184.219.63.158 dst=23.150.158.130 protocol=udp sport=5976 dport=31263 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=23.150.158.130 1 1658148302.104143639 M64_MX67C_Augusta flows src=184.219.63.158 dst=23.150.158.130 protocol=udp sport=5976 dport=31263 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5976
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 31263
protocol: 17
streamName: meraki
clientIP: 23.150.158.130
serverIP: 184.219.63.158
|
Explain this syslog message
|
<134>Original Address=221.163.76.64 1 1658148302.104143639 M64_MX67C_Augusta flows src=181.109.84.166 dst=221.163.76.64 protocol=udp sport=5976 dport=31263 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5976,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=221.163.76.64 1 1658148302.104143639 M64_MX67C_Augusta flows src=181.109.84.166 dst=221.163.76.64 protocol=udp sport=5976 dport=31263 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 31263,
"protocol": 17,
"streamName": "meraki",
"clientIP": "221.163.76.64",
"serverIP": "181.109.84.166"
}
|
Create a JSON artifact from the message
|
<134>Original Address=221.163.76.64 1 1658148302.104143639 M64_MX67C_Augusta flows src=181.109.84.166 dst=221.163.76.64 protocol=udp sport=5976 dport=31263 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=221.163.76.64 1 1658148302.104143639 M64_MX67C_Augusta flows src=181.109.84.166 dst=221.163.76.64 protocol=udp sport=5976 dport=31263 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5976
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 31263
protocol: 17
streamName: meraki
clientIP: 221.163.76.64
serverIP: 181.109.84.166
|
Explain this syslog message
|
<134>Original Address=65.203.35.55 1 1658148301.773483599 M64_MX67C_Augusta flows src=174.184.130.166 dst=65.203.35.55 protocol=udp sport=5976 dport=9559 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5976,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.203.35.55 1 1658148301.773483599 M64_MX67C_Augusta flows src=174.184.130.166 dst=65.203.35.55 protocol=udp sport=5976 dport=9559 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 9559,
"protocol": 17,
"streamName": "meraki",
"clientIP": "65.203.35.55",
"serverIP": "174.184.130.166"
}
|
Create a JSON artifact from the message
|
<134>Original Address=65.203.35.55 1 1658148301.773483599 M64_MX67C_Augusta flows src=174.184.130.166 dst=65.203.35.55 protocol=udp sport=5976 dport=9559 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=65.203.35.55 1 1658148301.773483599 M64_MX67C_Augusta flows src=174.184.130.166 dst=65.203.35.55 protocol=udp sport=5976 dport=9559 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5976
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 9559
protocol: 17
streamName: meraki
clientIP: 65.203.35.55
serverIP: 174.184.130.166
|
Explain this syslog message
|
<134>Original Address=47.199.82.29 1 1658148301.773483599 M64_MX67C_Augusta flows src=146.209.97.210 dst=47.199.82.29 protocol=udp sport=5976 dport=9559 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5976,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=47.199.82.29 1 1658148301.773483599 M64_MX67C_Augusta flows src=146.209.97.210 dst=47.199.82.29 protocol=udp sport=5976 dport=9559 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 9559,
"protocol": 17,
"streamName": "meraki",
"clientIP": "47.199.82.29",
"serverIP": "146.209.97.210"
}
|
Create a JSON artifact from the message
|
<134>Original Address=47.199.82.29 1 1658148301.773483599 M64_MX67C_Augusta flows src=146.209.97.210 dst=47.199.82.29 protocol=udp sport=5976 dport=9559 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=47.199.82.29 1 1658148301.773483599 M64_MX67C_Augusta flows src=146.209.97.210 dst=47.199.82.29 protocol=udp sport=5976 dport=9559 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5976
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 9559
protocol: 17
streamName: meraki
clientIP: 47.199.82.29
serverIP: 146.209.97.210
|
Explain this syslog message
|
<134>Original Address=211.140.120.184 1 1658148302.277751159 M64_MX67C_Augusta flows src=245.179.97.51 dst=211.140.120.184 protocol=udp sport=5976 dport=14410 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5976,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=211.140.120.184 1 1658148302.277751159 M64_MX67C_Augusta flows src=245.179.97.51 dst=211.140.120.184 protocol=udp sport=5976 dport=14410 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 14410,
"protocol": 17,
"streamName": "meraki",
"clientIP": "211.140.120.184",
"serverIP": "245.179.97.51"
}
|
Create a JSON artifact from the message
|
<134>Original Address=211.140.120.184 1 1658148302.277751159 M64_MX67C_Augusta flows src=245.179.97.51 dst=211.140.120.184 protocol=udp sport=5976 dport=14410 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=211.140.120.184 1 1658148302.277751159 M64_MX67C_Augusta flows src=245.179.97.51 dst=211.140.120.184 protocol=udp sport=5976 dport=14410 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5976
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 14410
protocol: 17
streamName: meraki
clientIP: 211.140.120.184
serverIP: 245.179.97.51
|
Explain this syslog message
|
<134>Original Address=28.157.131.12 1 1658148302.277751159 M64_MX67C_Augusta flows src=211.153.175.206 dst=28.157.131.12 protocol=udp sport=5976 dport=14410 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5976,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=28.157.131.12 1 1658148302.277751159 M64_MX67C_Augusta flows src=211.153.175.206 dst=28.157.131.12 protocol=udp sport=5976 dport=14410 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 14410,
"protocol": 17,
"streamName": "meraki",
"clientIP": "28.157.131.12",
"serverIP": "211.153.175.206"
}
|
Create a JSON artifact from the message
|
<134>Original Address=28.157.131.12 1 1658148302.277751159 M64_MX67C_Augusta flows src=211.153.175.206 dst=28.157.131.12 protocol=udp sport=5976 dport=14410 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=28.157.131.12 1 1658148302.277751159 M64_MX67C_Augusta flows src=211.153.175.206 dst=28.157.131.12 protocol=udp sport=5976 dport=14410 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5976
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 14410
protocol: 17
streamName: meraki
clientIP: 28.157.131.12
serverIP: 211.153.175.206
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1658148303.148442986 M61_MX67C_Savannah flows src=171.148.68.56 dst=125.228.140.207 protocol=tcp sport=49593 dport=8080 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 8080,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1658148303.148442986 M61_MX67C_Savannah flows src=171.148.68.56 dst=125.228.140.207 protocol=tcp sport=49593 dport=8080 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 49593,
"protocol": 6,
"streamName": "meraki",
"clientIP": "171.148.68.56",
"serverIP": "125.228.140.207"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1658148303.148442986 M61_MX67C_Savannah flows src=171.148.68.56 dst=125.228.140.207 protocol=tcp sport=49593 dport=8080 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1658148303.148442986 M61_MX67C_Savannah flows src=171.148.68.56 dst=125.228.140.207 protocol=tcp sport=49593 dport=8080 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 8080
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 49593
protocol: 6
streamName: meraki
clientIP: 171.148.68.56
serverIP: 125.228.140.207
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1658148303.148442986 M61_MX67C_Savannah flows src=105.136.205.207 dst=142.219.194.74 protocol=tcp sport=49593 dport=8080 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 8080,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1658148303.148442986 M61_MX67C_Savannah flows src=105.136.205.207 dst=142.219.194.74 protocol=tcp sport=49593 dport=8080 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 49593,
"protocol": 6,
"streamName": "meraki",
"clientIP": "105.136.205.207",
"serverIP": "142.219.194.74"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1658148303.148442986 M61_MX67C_Savannah flows src=105.136.205.207 dst=142.219.194.74 protocol=tcp sport=49593 dport=8080 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1658148303.148442986 M61_MX67C_Savannah flows src=105.136.205.207 dst=142.219.194.74 protocol=tcp sport=49593 dport=8080 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 8080
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 49593
protocol: 6
streamName: meraki
clientIP: 105.136.205.207
serverIP: 142.219.194.74
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1658148302.789247906 M61_MX67C_Savannah flows src=166.45.48.94 dst=101.157.140.38 protocol=udp sport=5967 dport=28947 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5967,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1658148302.789247906 M61_MX67C_Savannah flows src=166.45.48.94 dst=101.157.140.38 protocol=udp sport=5967 dport=28947 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 28947,
"protocol": 17,
"streamName": "meraki",
"clientIP": "101.157.140.38",
"serverIP": "166.45.48.94"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1658148302.789247906 M61_MX67C_Savannah flows src=166.45.48.94 dst=101.157.140.38 protocol=udp sport=5967 dport=28947 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1658148302.789247906 M61_MX67C_Savannah flows src=166.45.48.94 dst=101.157.140.38 protocol=udp sport=5967 dport=28947 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5967
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 28947
protocol: 17
streamName: meraki
clientIP: 101.157.140.38
serverIP: 166.45.48.94
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1658148302.789247906 M61_MX67C_Savannah flows src=124.249.52.17 dst=139.90.26.239 protocol=udp sport=5967 dport=28947 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5967,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1658148302.789247906 M61_MX67C_Savannah flows src=124.249.52.17 dst=139.90.26.239 protocol=udp sport=5967 dport=28947 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 28947,
"protocol": 17,
"streamName": "meraki",
"clientIP": "139.90.26.239",
"serverIP": "124.249.52.17"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1658148302.789247906 M61_MX67C_Savannah flows src=124.249.52.17 dst=139.90.26.239 protocol=udp sport=5967 dport=28947 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1658148302.789247906 M61_MX67C_Savannah flows src=124.249.52.17 dst=139.90.26.239 protocol=udp sport=5967 dport=28947 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5967
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 28947
protocol: 17
streamName: meraki
clientIP: 139.90.26.239
serverIP: 124.249.52.17
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1658148302.842252986 M61_MX67C_Savannah flows src=79.242.244.37 dst=121.135.171.156 protocol=udp sport=5967 dport=28947 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5967,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1658148302.842252986 M61_MX67C_Savannah flows src=79.242.244.37 dst=121.135.171.156 protocol=udp sport=5967 dport=28947 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 28947,
"protocol": 17,
"streamName": "meraki",
"clientIP": "121.135.171.156",
"serverIP": "79.242.244.37"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1658148302.842252986 M61_MX67C_Savannah flows src=79.242.244.37 dst=121.135.171.156 protocol=udp sport=5967 dport=28947 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1658148302.842252986 M61_MX67C_Savannah flows src=79.242.244.37 dst=121.135.171.156 protocol=udp sport=5967 dport=28947 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5967
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 28947
protocol: 17
streamName: meraki
clientIP: 121.135.171.156
serverIP: 79.242.244.37
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1658148302.842252986 M61_MX67C_Savannah flows src=133.245.5.38 dst=64.86.34.168 protocol=udp sport=5967 dport=28947 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5967,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1658148302.842252986 M61_MX67C_Savannah flows src=133.245.5.38 dst=64.86.34.168 protocol=udp sport=5967 dport=28947 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 28947,
"protocol": 17,
"streamName": "meraki",
"clientIP": "64.86.34.168",
"serverIP": "133.245.5.38"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1658148302.842252986 M61_MX67C_Savannah flows src=133.245.5.38 dst=64.86.34.168 protocol=udp sport=5967 dport=28947 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1658148302.842252986 M61_MX67C_Savannah flows src=133.245.5.38 dst=64.86.34.168 protocol=udp sport=5967 dport=28947 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5967
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 28947
protocol: 17
streamName: meraki
clientIP: 64.86.34.168
serverIP: 133.245.5.38
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1658148303.108180626 M61_MX67C_Savannah flows src=68.11.160.60 dst=6.238.213.155 protocol=udp sport=5967 dport=28947 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5967,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1658148303.108180626 M61_MX67C_Savannah flows src=68.11.160.60 dst=6.238.213.155 protocol=udp sport=5967 dport=28947 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 28947,
"protocol": 17,
"streamName": "meraki",
"clientIP": "6.238.213.155",
"serverIP": "68.11.160.60"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1658148303.108180626 M61_MX67C_Savannah flows src=68.11.160.60 dst=6.238.213.155 protocol=udp sport=5967 dport=28947 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1658148303.108180626 M61_MX67C_Savannah flows src=68.11.160.60 dst=6.238.213.155 protocol=udp sport=5967 dport=28947 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5967
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 28947
protocol: 17
streamName: meraki
clientIP: 6.238.213.155
serverIP: 68.11.160.60
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1658148303.108180626 M61_MX67C_Savannah flows src=190.200.198.184 dst=97.144.31.57 protocol=udp sport=5967 dport=28947 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5967,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1658148303.108180626 M61_MX67C_Savannah flows src=190.200.198.184 dst=97.144.31.57 protocol=udp sport=5967 dport=28947 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 28947,
"protocol": 17,
"streamName": "meraki",
"clientIP": "97.144.31.57",
"serverIP": "190.200.198.184"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1658148303.108180626 M61_MX67C_Savannah flows src=190.200.198.184 dst=97.144.31.57 protocol=udp sport=5967 dport=28947 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1658148303.108180626 M61_MX67C_Savannah flows src=190.200.198.184 dst=97.144.31.57 protocol=udp sport=5967 dport=28947 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5967
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 28947
protocol: 17
streamName: meraki
clientIP: 97.144.31.57
serverIP: 190.200.198.184
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1658148303.148442986 M61_MX67C_Savannah flows src=88.150.56.116 dst=135.179.51.42 protocol=tcp sport=49593 dport=8080 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 8080,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1658148303.148442986 M61_MX67C_Savannah flows src=88.150.56.116 dst=135.179.51.42 protocol=tcp sport=49593 dport=8080 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 49593,
"protocol": 6,
"streamName": "meraki",
"clientIP": "88.150.56.116",
"serverIP": "135.179.51.42"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1658148303.148442986 M61_MX67C_Savannah flows src=88.150.56.116 dst=135.179.51.42 protocol=tcp sport=49593 dport=8080 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1658148303.148442986 M61_MX67C_Savannah flows src=88.150.56.116 dst=135.179.51.42 protocol=tcp sport=49593 dport=8080 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 8080
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 49593
protocol: 6
streamName: meraki
clientIP: 88.150.56.116
serverIP: 135.179.51.42
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1658148303.148442986 M61_MX67C_Savannah flows src=141.222.52.249 dst=144.46.64.118 protocol=tcp sport=49593 dport=8080 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 8080,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1658148303.148442986 M61_MX67C_Savannah flows src=141.222.52.249 dst=144.46.64.118 protocol=tcp sport=49593 dport=8080 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 49593,
"protocol": 6,
"streamName": "meraki",
"clientIP": "141.222.52.249",
"serverIP": "144.46.64.118"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1658148303.148442986 M61_MX67C_Savannah flows src=141.222.52.249 dst=144.46.64.118 protocol=tcp sport=49593 dport=8080 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1658148303.148442986 M61_MX67C_Savannah flows src=141.222.52.249 dst=144.46.64.118 protocol=tcp sport=49593 dport=8080 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 8080
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 49593
protocol: 6
streamName: meraki
clientIP: 141.222.52.249
serverIP: 144.46.64.118
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1658148303.175992546 M61_MX67C_Savannah flows src=206.171.188.115 dst=80.95.25.88 protocol=udp sport=5967 dport=28947 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5967,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1658148303.175992546 M61_MX67C_Savannah flows src=206.171.188.115 dst=80.95.25.88 protocol=udp sport=5967 dport=28947 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 28947,
"protocol": 17,
"streamName": "meraki",
"clientIP": "80.95.25.88",
"serverIP": "206.171.188.115"
}
|
Create a JSON artifact from the message
|
<134>Original Address=75.146.93.165 1 1658148303.175992546 M61_MX67C_Savannah flows src=206.171.188.115 dst=80.95.25.88 protocol=udp sport=5967 dport=28947 pattern: 1 all
|
Product: Meraki
Vendor: Cisco
|
Identify this syslog message
|
<134>Original Address=75.146.93.165 1 1658148303.175992546 M61_MX67C_Savannah flows src=206.171.188.115 dst=80.95.25.88 protocol=udp sport=5967 dport=28947 pattern: 1 all
|
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5967
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 28947
protocol: 17
streamName: meraki
clientIP: 80.95.25.88
serverIP: 206.171.188.115
|
Explain this syslog message
|
<134>Original Address=75.146.93.165 1 1658148303.175992546 M61_MX67C_Savannah flows src=27.19.208.249 dst=114.244.96.35 protocol=udp sport=5967 dport=28947 pattern: 1 all
|
{
"senderhost": "192.168.2.250",
"serverport": 5967,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1658148303.175992546 M61_MX67C_Savannah flows src=27.19.208.249 dst=114.244.96.35 protocol=udp sport=5967 dport=28947 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 28947,
"protocol": 17,
"streamName": "meraki",
"clientIP": "114.244.96.35",
"serverIP": "27.19.208.249"
}
|
Create a JSON artifact from the message
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.