input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<134>Original Address=146.248.194.202 1 1658148302.040706919 M64_MX67C_Augusta flows src=50.3.213.3 dst=146.248.194.202 protocol=udp sport=5976 dport=54765 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5976, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=146.248.194.202 1 1658148302.040706919 M64_MX67C_Augusta flows src=50.3.213.3 dst=146.248.194.202 protocol=udp sport=5976 dport=54765 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 54765, "protocol": 17, "streamName": "meraki", "clientIP": "146.248.194.202", "serverIP": "50.3.213.3" }
Create a JSON artifact from the message
<134>Original Address=146.248.194.202 1 1658148302.040706919 M64_MX67C_Augusta flows src=50.3.213.3 dst=146.248.194.202 protocol=udp sport=5976 dport=54765 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=146.248.194.202 1 1658148302.040706919 M64_MX67C_Augusta flows src=50.3.213.3 dst=146.248.194.202 protocol=udp sport=5976 dport=54765 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5976 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 54765 protocol: 17 streamName: meraki clientIP: 146.248.194.202 serverIP: 50.3.213.3
Explain this syslog message
<134>Original Address=29.14.154.145 1 1658148302.040706919 M64_MX67C_Augusta flows src=46.131.61.163 dst=29.14.154.145 protocol=udp sport=5976 dport=54765 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5976, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=29.14.154.145 1 1658148302.040706919 M64_MX67C_Augusta flows src=46.131.61.163 dst=29.14.154.145 protocol=udp sport=5976 dport=54765 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 54765, "protocol": 17, "streamName": "meraki", "clientIP": "29.14.154.145", "serverIP": "46.131.61.163" }
Create a JSON artifact from the message
<134>Original Address=29.14.154.145 1 1658148302.040706919 M64_MX67C_Augusta flows src=46.131.61.163 dst=29.14.154.145 protocol=udp sport=5976 dport=54765 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=29.14.154.145 1 1658148302.040706919 M64_MX67C_Augusta flows src=46.131.61.163 dst=29.14.154.145 protocol=udp sport=5976 dport=54765 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5976 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 54765 protocol: 17 streamName: meraki clientIP: 29.14.154.145 serverIP: 46.131.61.163
Explain this syslog message
<134>Original Address=41.164.166.157 1 1658148302.104143639 M64_MX67C_Augusta flows src=45.30.139.225 dst=41.164.166.157 protocol=udp sport=5976 dport=31263 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5976, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=41.164.166.157 1 1658148302.104143639 M64_MX67C_Augusta flows src=45.30.139.225 dst=41.164.166.157 protocol=udp sport=5976 dport=31263 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 31263, "protocol": 17, "streamName": "meraki", "clientIP": "41.164.166.157", "serverIP": "45.30.139.225" }
Create a JSON artifact from the message
<134>Original Address=41.164.166.157 1 1658148302.104143639 M64_MX67C_Augusta flows src=45.30.139.225 dst=41.164.166.157 protocol=udp sport=5976 dport=31263 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=41.164.166.157 1 1658148302.104143639 M64_MX67C_Augusta flows src=45.30.139.225 dst=41.164.166.157 protocol=udp sport=5976 dport=31263 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5976 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 31263 protocol: 17 streamName: meraki clientIP: 41.164.166.157 serverIP: 45.30.139.225
Explain this syslog message
<134>Original Address=170.98.37.177 1 1658148302.104143639 M64_MX67C_Augusta flows src=135.214.250.199 dst=170.98.37.177 protocol=udp sport=5976 dport=31263 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5976, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=170.98.37.177 1 1658148302.104143639 M64_MX67C_Augusta flows src=135.214.250.199 dst=170.98.37.177 protocol=udp sport=5976 dport=31263 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 31263, "protocol": 17, "streamName": "meraki", "clientIP": "170.98.37.177", "serverIP": "135.214.250.199" }
Create a JSON artifact from the message
<134>Original Address=170.98.37.177 1 1658148302.104143639 M64_MX67C_Augusta flows src=135.214.250.199 dst=170.98.37.177 protocol=udp sport=5976 dport=31263 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=170.98.37.177 1 1658148302.104143639 M64_MX67C_Augusta flows src=135.214.250.199 dst=170.98.37.177 protocol=udp sport=5976 dport=31263 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5976 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 31263 protocol: 17 streamName: meraki clientIP: 170.98.37.177 serverIP: 135.214.250.199
Explain this syslog message
<134>Original Address=198.166.32.251 1 1658148301.773483599 M64_MX67C_Augusta flows src=157.37.95.134 dst=198.166.32.251 protocol=udp sport=5976 dport=9559 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5976, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=198.166.32.251 1 1658148301.773483599 M64_MX67C_Augusta flows src=157.37.95.134 dst=198.166.32.251 protocol=udp sport=5976 dport=9559 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 9559, "protocol": 17, "streamName": "meraki", "clientIP": "198.166.32.251", "serverIP": "157.37.95.134" }
Create a JSON artifact from the message
<134>Original Address=198.166.32.251 1 1658148301.773483599 M64_MX67C_Augusta flows src=157.37.95.134 dst=198.166.32.251 protocol=udp sport=5976 dport=9559 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=198.166.32.251 1 1658148301.773483599 M64_MX67C_Augusta flows src=157.37.95.134 dst=198.166.32.251 protocol=udp sport=5976 dport=9559 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5976 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 9559 protocol: 17 streamName: meraki clientIP: 198.166.32.251 serverIP: 157.37.95.134
Explain this syslog message
<134>Original Address=18.225.164.112 1 1658148301.773483599 M64_MX67C_Augusta flows src=139.159.104.70 dst=18.225.164.112 protocol=udp sport=5976 dport=9559 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5976, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=18.225.164.112 1 1658148301.773483599 M64_MX67C_Augusta flows src=139.159.104.70 dst=18.225.164.112 protocol=udp sport=5976 dport=9559 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 9559, "protocol": 17, "streamName": "meraki", "clientIP": "18.225.164.112", "serverIP": "139.159.104.70" }
Create a JSON artifact from the message
<134>Original Address=18.225.164.112 1 1658148301.773483599 M64_MX67C_Augusta flows src=139.159.104.70 dst=18.225.164.112 protocol=udp sport=5976 dport=9559 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=18.225.164.112 1 1658148301.773483599 M64_MX67C_Augusta flows src=139.159.104.70 dst=18.225.164.112 protocol=udp sport=5976 dport=9559 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5976 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 9559 protocol: 17 streamName: meraki clientIP: 18.225.164.112 serverIP: 139.159.104.70
Explain this syslog message
<134>Original Address=92.178.71.75 1 1658148302.277751159 M64_MX67C_Augusta flows src=45.15.136.17 dst=92.178.71.75 protocol=udp sport=5976 dport=14410 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5976, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=92.178.71.75 1 1658148302.277751159 M64_MX67C_Augusta flows src=45.15.136.17 dst=92.178.71.75 protocol=udp sport=5976 dport=14410 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 14410, "protocol": 17, "streamName": "meraki", "clientIP": "92.178.71.75", "serverIP": "45.15.136.17" }
Create a JSON artifact from the message
<134>Original Address=92.178.71.75 1 1658148302.277751159 M64_MX67C_Augusta flows src=45.15.136.17 dst=92.178.71.75 protocol=udp sport=5976 dport=14410 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=92.178.71.75 1 1658148302.277751159 M64_MX67C_Augusta flows src=45.15.136.17 dst=92.178.71.75 protocol=udp sport=5976 dport=14410 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5976 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 14410 protocol: 17 streamName: meraki clientIP: 92.178.71.75 serverIP: 45.15.136.17
Explain this syslog message
<134>Original Address=224.15.159.99 1 1658148302.277751159 M64_MX67C_Augusta flows src=252.255.43.200 dst=224.15.159.99 protocol=udp sport=5976 dport=14410 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5976, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=224.15.159.99 1 1658148302.277751159 M64_MX67C_Augusta flows src=252.255.43.200 dst=224.15.159.99 protocol=udp sport=5976 dport=14410 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 14410, "protocol": 17, "streamName": "meraki", "clientIP": "224.15.159.99", "serverIP": "252.255.43.200" }
Create a JSON artifact from the message
<134>Original Address=224.15.159.99 1 1658148302.277751159 M64_MX67C_Augusta flows src=252.255.43.200 dst=224.15.159.99 protocol=udp sport=5976 dport=14410 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=224.15.159.99 1 1658148302.277751159 M64_MX67C_Augusta flows src=252.255.43.200 dst=224.15.159.99 protocol=udp sport=5976 dport=14410 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5976 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 14410 protocol: 17 streamName: meraki clientIP: 224.15.159.99 serverIP: 252.255.43.200
Explain this syslog message
<134>Original Address=84.204.248.225 1 1658148301.911582759 M64_MX67C_Augusta flows src=208.52.82.5 dst=84.204.248.225 protocol=udp sport=5976 dport=47643 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5976, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=84.204.248.225 1 1658148301.911582759 M64_MX67C_Augusta flows src=208.52.82.5 dst=84.204.248.225 protocol=udp sport=5976 dport=47643 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 47643, "protocol": 17, "streamName": "meraki", "clientIP": "84.204.248.225", "serverIP": "208.52.82.5" }
Create a JSON artifact from the message
<134>Original Address=84.204.248.225 1 1658148301.911582759 M64_MX67C_Augusta flows src=208.52.82.5 dst=84.204.248.225 protocol=udp sport=5976 dport=47643 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=84.204.248.225 1 1658148301.911582759 M64_MX67C_Augusta flows src=208.52.82.5 dst=84.204.248.225 protocol=udp sport=5976 dport=47643 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5976 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 47643 protocol: 17 streamName: meraki clientIP: 84.204.248.225 serverIP: 208.52.82.5
Explain this syslog message
<134>Original Address=5.216.224.78 1 1658148301.911582759 M64_MX67C_Augusta flows src=209.231.193.67 dst=5.216.224.78 protocol=udp sport=5976 dport=47643 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5976, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=5.216.224.78 1 1658148301.911582759 M64_MX67C_Augusta flows src=209.231.193.67 dst=5.216.224.78 protocol=udp sport=5976 dport=47643 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 47643, "protocol": 17, "streamName": "meraki", "clientIP": "5.216.224.78", "serverIP": "209.231.193.67" }
Create a JSON artifact from the message
<134>Original Address=5.216.224.78 1 1658148301.911582759 M64_MX67C_Augusta flows src=209.231.193.67 dst=5.216.224.78 protocol=udp sport=5976 dport=47643 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=5.216.224.78 1 1658148301.911582759 M64_MX67C_Augusta flows src=209.231.193.67 dst=5.216.224.78 protocol=udp sport=5976 dport=47643 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5976 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 47643 protocol: 17 streamName: meraki clientIP: 5.216.224.78 serverIP: 209.231.193.67
Explain this syslog message
<134>Original Address=235.254.23.171 1 1658148301.941441239 M64_MX67C_Augusta flows src=66.216.213.161 dst=235.254.23.171 protocol=udp sport=5976 dport=38220 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5976, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=235.254.23.171 1 1658148301.941441239 M64_MX67C_Augusta flows src=66.216.213.161 dst=235.254.23.171 protocol=udp sport=5976 dport=38220 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 38220, "protocol": 17, "streamName": "meraki", "clientIP": "235.254.23.171", "serverIP": "66.216.213.161" }
Create a JSON artifact from the message
<134>Original Address=235.254.23.171 1 1658148301.941441239 M64_MX67C_Augusta flows src=66.216.213.161 dst=235.254.23.171 protocol=udp sport=5976 dport=38220 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=235.254.23.171 1 1658148301.941441239 M64_MX67C_Augusta flows src=66.216.213.161 dst=235.254.23.171 protocol=udp sport=5976 dport=38220 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5976 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 38220 protocol: 17 streamName: meraki clientIP: 235.254.23.171 serverIP: 66.216.213.161
Explain this syslog message
<134>Original Address=127.137.49.5 1 1658148301.941441239 M64_MX67C_Augusta flows src=207.0.125.102 dst=127.137.49.5 protocol=udp sport=5976 dport=38220 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5976, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=127.137.49.5 1 1658148301.941441239 M64_MX67C_Augusta flows src=207.0.125.102 dst=127.137.49.5 protocol=udp sport=5976 dport=38220 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 38220, "protocol": 17, "streamName": "meraki", "clientIP": "127.137.49.5", "serverIP": "207.0.125.102" }
Create a JSON artifact from the message
<134>Original Address=127.137.49.5 1 1658148301.941441239 M64_MX67C_Augusta flows src=207.0.125.102 dst=127.137.49.5 protocol=udp sport=5976 dport=38220 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=127.137.49.5 1 1658148301.941441239 M64_MX67C_Augusta flows src=207.0.125.102 dst=127.137.49.5 protocol=udp sport=5976 dport=38220 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5976 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 38220 protocol: 17 streamName: meraki clientIP: 127.137.49.5 serverIP: 207.0.125.102
Explain this syslog message
<134>Original Address=25.246.173.42 1 1658148301.964343199 M64_MX67C_Augusta flows src=47.165.206.130 dst=25.246.173.42 protocol=udp sport=5976 dport=63612 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5976, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=25.246.173.42 1 1658148301.964343199 M64_MX67C_Augusta flows src=47.165.206.130 dst=25.246.173.42 protocol=udp sport=5976 dport=63612 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 63612, "protocol": 17, "streamName": "meraki", "clientIP": "25.246.173.42", "serverIP": "47.165.206.130" }
Create a JSON artifact from the message
<134>Original Address=25.246.173.42 1 1658148301.964343199 M64_MX67C_Augusta flows src=47.165.206.130 dst=25.246.173.42 protocol=udp sport=5976 dport=63612 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=25.246.173.42 1 1658148301.964343199 M64_MX67C_Augusta flows src=47.165.206.130 dst=25.246.173.42 protocol=udp sport=5976 dport=63612 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5976 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 63612 protocol: 17 streamName: meraki clientIP: 25.246.173.42 serverIP: 47.165.206.130
Explain this syslog message
<134>Original Address=126.35.69.185 1 1658148301.964343199 M64_MX67C_Augusta flows src=233.255.232.116 dst=126.35.69.185 protocol=udp sport=5976 dport=63612 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5976, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=126.35.69.185 1 1658148301.964343199 M64_MX67C_Augusta flows src=233.255.232.116 dst=126.35.69.185 protocol=udp sport=5976 dport=63612 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 63612, "protocol": 17, "streamName": "meraki", "clientIP": "126.35.69.185", "serverIP": "233.255.232.116" }
Create a JSON artifact from the message
<134>Original Address=126.35.69.185 1 1658148301.964343199 M64_MX67C_Augusta flows src=233.255.232.116 dst=126.35.69.185 protocol=udp sport=5976 dport=63612 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=126.35.69.185 1 1658148301.964343199 M64_MX67C_Augusta flows src=233.255.232.116 dst=126.35.69.185 protocol=udp sport=5976 dport=63612 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5976 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 63612 protocol: 17 streamName: meraki clientIP: 126.35.69.185 serverIP: 233.255.232.116
Explain this syslog message
<134>Original Address=118.174.174.9 1 1658148302.040706919 M64_MX67C_Augusta flows src=182.52.26.30 dst=118.174.174.9 protocol=udp sport=5976 dport=54765 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5976, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=118.174.174.9 1 1658148302.040706919 M64_MX67C_Augusta flows src=182.52.26.30 dst=118.174.174.9 protocol=udp sport=5976 dport=54765 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 54765, "protocol": 17, "streamName": "meraki", "clientIP": "118.174.174.9", "serverIP": "182.52.26.30" }
Create a JSON artifact from the message
<134>Original Address=118.174.174.9 1 1658148302.040706919 M64_MX67C_Augusta flows src=182.52.26.30 dst=118.174.174.9 protocol=udp sport=5976 dport=54765 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=118.174.174.9 1 1658148302.040706919 M64_MX67C_Augusta flows src=182.52.26.30 dst=118.174.174.9 protocol=udp sport=5976 dport=54765 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5976 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 54765 protocol: 17 streamName: meraki clientIP: 118.174.174.9 serverIP: 182.52.26.30
Explain this syslog message
<134>Original Address=254.140.175.40 1 1658148302.040706919 M64_MX67C_Augusta flows src=140.112.174.64 dst=254.140.175.40 protocol=udp sport=5976 dport=54765 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5976, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=254.140.175.40 1 1658148302.040706919 M64_MX67C_Augusta flows src=140.112.174.64 dst=254.140.175.40 protocol=udp sport=5976 dport=54765 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 54765, "protocol": 17, "streamName": "meraki", "clientIP": "254.140.175.40", "serverIP": "140.112.174.64" }
Create a JSON artifact from the message
<134>Original Address=254.140.175.40 1 1658148302.040706919 M64_MX67C_Augusta flows src=140.112.174.64 dst=254.140.175.40 protocol=udp sport=5976 dport=54765 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=254.140.175.40 1 1658148302.040706919 M64_MX67C_Augusta flows src=140.112.174.64 dst=254.140.175.40 protocol=udp sport=5976 dport=54765 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5976 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 54765 protocol: 17 streamName: meraki clientIP: 254.140.175.40 serverIP: 140.112.174.64
Explain this syslog message
<134>Original Address=23.150.158.130 1 1658148302.104143639 M64_MX67C_Augusta flows src=184.219.63.158 dst=23.150.158.130 protocol=udp sport=5976 dport=31263 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5976, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=23.150.158.130 1 1658148302.104143639 M64_MX67C_Augusta flows src=184.219.63.158 dst=23.150.158.130 protocol=udp sport=5976 dport=31263 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 31263, "protocol": 17, "streamName": "meraki", "clientIP": "23.150.158.130", "serverIP": "184.219.63.158" }
Create a JSON artifact from the message
<134>Original Address=23.150.158.130 1 1658148302.104143639 M64_MX67C_Augusta flows src=184.219.63.158 dst=23.150.158.130 protocol=udp sport=5976 dport=31263 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=23.150.158.130 1 1658148302.104143639 M64_MX67C_Augusta flows src=184.219.63.158 dst=23.150.158.130 protocol=udp sport=5976 dport=31263 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5976 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 31263 protocol: 17 streamName: meraki clientIP: 23.150.158.130 serverIP: 184.219.63.158
Explain this syslog message
<134>Original Address=221.163.76.64 1 1658148302.104143639 M64_MX67C_Augusta flows src=181.109.84.166 dst=221.163.76.64 protocol=udp sport=5976 dport=31263 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5976, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=221.163.76.64 1 1658148302.104143639 M64_MX67C_Augusta flows src=181.109.84.166 dst=221.163.76.64 protocol=udp sport=5976 dport=31263 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 31263, "protocol": 17, "streamName": "meraki", "clientIP": "221.163.76.64", "serverIP": "181.109.84.166" }
Create a JSON artifact from the message
<134>Original Address=221.163.76.64 1 1658148302.104143639 M64_MX67C_Augusta flows src=181.109.84.166 dst=221.163.76.64 protocol=udp sport=5976 dport=31263 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=221.163.76.64 1 1658148302.104143639 M64_MX67C_Augusta flows src=181.109.84.166 dst=221.163.76.64 protocol=udp sport=5976 dport=31263 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5976 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 31263 protocol: 17 streamName: meraki clientIP: 221.163.76.64 serverIP: 181.109.84.166
Explain this syslog message
<134>Original Address=65.203.35.55 1 1658148301.773483599 M64_MX67C_Augusta flows src=174.184.130.166 dst=65.203.35.55 protocol=udp sport=5976 dport=9559 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5976, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=65.203.35.55 1 1658148301.773483599 M64_MX67C_Augusta flows src=174.184.130.166 dst=65.203.35.55 protocol=udp sport=5976 dport=9559 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 9559, "protocol": 17, "streamName": "meraki", "clientIP": "65.203.35.55", "serverIP": "174.184.130.166" }
Create a JSON artifact from the message
<134>Original Address=65.203.35.55 1 1658148301.773483599 M64_MX67C_Augusta flows src=174.184.130.166 dst=65.203.35.55 protocol=udp sport=5976 dport=9559 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=65.203.35.55 1 1658148301.773483599 M64_MX67C_Augusta flows src=174.184.130.166 dst=65.203.35.55 protocol=udp sport=5976 dport=9559 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5976 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 9559 protocol: 17 streamName: meraki clientIP: 65.203.35.55 serverIP: 174.184.130.166
Explain this syslog message
<134>Original Address=47.199.82.29 1 1658148301.773483599 M64_MX67C_Augusta flows src=146.209.97.210 dst=47.199.82.29 protocol=udp sport=5976 dport=9559 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5976, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=47.199.82.29 1 1658148301.773483599 M64_MX67C_Augusta flows src=146.209.97.210 dst=47.199.82.29 protocol=udp sport=5976 dport=9559 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 9559, "protocol": 17, "streamName": "meraki", "clientIP": "47.199.82.29", "serverIP": "146.209.97.210" }
Create a JSON artifact from the message
<134>Original Address=47.199.82.29 1 1658148301.773483599 M64_MX67C_Augusta flows src=146.209.97.210 dst=47.199.82.29 protocol=udp sport=5976 dport=9559 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=47.199.82.29 1 1658148301.773483599 M64_MX67C_Augusta flows src=146.209.97.210 dst=47.199.82.29 protocol=udp sport=5976 dport=9559 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5976 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 9559 protocol: 17 streamName: meraki clientIP: 47.199.82.29 serverIP: 146.209.97.210
Explain this syslog message
<134>Original Address=211.140.120.184 1 1658148302.277751159 M64_MX67C_Augusta flows src=245.179.97.51 dst=211.140.120.184 protocol=udp sport=5976 dport=14410 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5976, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=211.140.120.184 1 1658148302.277751159 M64_MX67C_Augusta flows src=245.179.97.51 dst=211.140.120.184 protocol=udp sport=5976 dport=14410 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 14410, "protocol": 17, "streamName": "meraki", "clientIP": "211.140.120.184", "serverIP": "245.179.97.51" }
Create a JSON artifact from the message
<134>Original Address=211.140.120.184 1 1658148302.277751159 M64_MX67C_Augusta flows src=245.179.97.51 dst=211.140.120.184 protocol=udp sport=5976 dport=14410 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=211.140.120.184 1 1658148302.277751159 M64_MX67C_Augusta flows src=245.179.97.51 dst=211.140.120.184 protocol=udp sport=5976 dport=14410 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5976 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 14410 protocol: 17 streamName: meraki clientIP: 211.140.120.184 serverIP: 245.179.97.51
Explain this syslog message
<134>Original Address=28.157.131.12 1 1658148302.277751159 M64_MX67C_Augusta flows src=211.153.175.206 dst=28.157.131.12 protocol=udp sport=5976 dport=14410 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5976, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=28.157.131.12 1 1658148302.277751159 M64_MX67C_Augusta flows src=211.153.175.206 dst=28.157.131.12 protocol=udp sport=5976 dport=14410 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 14410, "protocol": 17, "streamName": "meraki", "clientIP": "28.157.131.12", "serverIP": "211.153.175.206" }
Create a JSON artifact from the message
<134>Original Address=28.157.131.12 1 1658148302.277751159 M64_MX67C_Augusta flows src=211.153.175.206 dst=28.157.131.12 protocol=udp sport=5976 dport=14410 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=28.157.131.12 1 1658148302.277751159 M64_MX67C_Augusta flows src=211.153.175.206 dst=28.157.131.12 protocol=udp sport=5976 dport=14410 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5976 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 14410 protocol: 17 streamName: meraki clientIP: 28.157.131.12 serverIP: 211.153.175.206
Explain this syslog message
<134>Original Address=75.146.93.165 1 1658148303.148442986 M61_MX67C_Savannah flows src=171.148.68.56 dst=125.228.140.207 protocol=tcp sport=49593 dport=8080 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 8080, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1658148303.148442986 M61_MX67C_Savannah flows src=171.148.68.56 dst=125.228.140.207 protocol=tcp sport=49593 dport=8080 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 49593, "protocol": 6, "streamName": "meraki", "clientIP": "171.148.68.56", "serverIP": "125.228.140.207" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1658148303.148442986 M61_MX67C_Savannah flows src=171.148.68.56 dst=125.228.140.207 protocol=tcp sport=49593 dport=8080 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1658148303.148442986 M61_MX67C_Savannah flows src=171.148.68.56 dst=125.228.140.207 protocol=tcp sport=49593 dport=8080 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 8080 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 49593 protocol: 6 streamName: meraki clientIP: 171.148.68.56 serverIP: 125.228.140.207
Explain this syslog message
<134>Original Address=75.146.93.165 1 1658148303.148442986 M61_MX67C_Savannah flows src=105.136.205.207 dst=142.219.194.74 protocol=tcp sport=49593 dport=8080 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 8080, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1658148303.148442986 M61_MX67C_Savannah flows src=105.136.205.207 dst=142.219.194.74 protocol=tcp sport=49593 dport=8080 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 49593, "protocol": 6, "streamName": "meraki", "clientIP": "105.136.205.207", "serverIP": "142.219.194.74" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1658148303.148442986 M61_MX67C_Savannah flows src=105.136.205.207 dst=142.219.194.74 protocol=tcp sport=49593 dport=8080 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1658148303.148442986 M61_MX67C_Savannah flows src=105.136.205.207 dst=142.219.194.74 protocol=tcp sport=49593 dport=8080 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 8080 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 49593 protocol: 6 streamName: meraki clientIP: 105.136.205.207 serverIP: 142.219.194.74
Explain this syslog message
<134>Original Address=75.146.93.165 1 1658148302.789247906 M61_MX67C_Savannah flows src=166.45.48.94 dst=101.157.140.38 protocol=udp sport=5967 dport=28947 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5967, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1658148302.789247906 M61_MX67C_Savannah flows src=166.45.48.94 dst=101.157.140.38 protocol=udp sport=5967 dport=28947 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 28947, "protocol": 17, "streamName": "meraki", "clientIP": "101.157.140.38", "serverIP": "166.45.48.94" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1658148302.789247906 M61_MX67C_Savannah flows src=166.45.48.94 dst=101.157.140.38 protocol=udp sport=5967 dport=28947 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1658148302.789247906 M61_MX67C_Savannah flows src=166.45.48.94 dst=101.157.140.38 protocol=udp sport=5967 dport=28947 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5967 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 28947 protocol: 17 streamName: meraki clientIP: 101.157.140.38 serverIP: 166.45.48.94
Explain this syslog message
<134>Original Address=75.146.93.165 1 1658148302.789247906 M61_MX67C_Savannah flows src=124.249.52.17 dst=139.90.26.239 protocol=udp sport=5967 dport=28947 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5967, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1658148302.789247906 M61_MX67C_Savannah flows src=124.249.52.17 dst=139.90.26.239 protocol=udp sport=5967 dport=28947 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 28947, "protocol": 17, "streamName": "meraki", "clientIP": "139.90.26.239", "serverIP": "124.249.52.17" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1658148302.789247906 M61_MX67C_Savannah flows src=124.249.52.17 dst=139.90.26.239 protocol=udp sport=5967 dport=28947 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1658148302.789247906 M61_MX67C_Savannah flows src=124.249.52.17 dst=139.90.26.239 protocol=udp sport=5967 dport=28947 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5967 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 28947 protocol: 17 streamName: meraki clientIP: 139.90.26.239 serverIP: 124.249.52.17
Explain this syslog message
<134>Original Address=75.146.93.165 1 1658148302.842252986 M61_MX67C_Savannah flows src=79.242.244.37 dst=121.135.171.156 protocol=udp sport=5967 dport=28947 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5967, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1658148302.842252986 M61_MX67C_Savannah flows src=79.242.244.37 dst=121.135.171.156 protocol=udp sport=5967 dport=28947 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 28947, "protocol": 17, "streamName": "meraki", "clientIP": "121.135.171.156", "serverIP": "79.242.244.37" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1658148302.842252986 M61_MX67C_Savannah flows src=79.242.244.37 dst=121.135.171.156 protocol=udp sport=5967 dport=28947 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1658148302.842252986 M61_MX67C_Savannah flows src=79.242.244.37 dst=121.135.171.156 protocol=udp sport=5967 dport=28947 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5967 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 28947 protocol: 17 streamName: meraki clientIP: 121.135.171.156 serverIP: 79.242.244.37
Explain this syslog message
<134>Original Address=75.146.93.165 1 1658148302.842252986 M61_MX67C_Savannah flows src=133.245.5.38 dst=64.86.34.168 protocol=udp sport=5967 dport=28947 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5967, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1658148302.842252986 M61_MX67C_Savannah flows src=133.245.5.38 dst=64.86.34.168 protocol=udp sport=5967 dport=28947 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 28947, "protocol": 17, "streamName": "meraki", "clientIP": "64.86.34.168", "serverIP": "133.245.5.38" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1658148302.842252986 M61_MX67C_Savannah flows src=133.245.5.38 dst=64.86.34.168 protocol=udp sport=5967 dport=28947 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1658148302.842252986 M61_MX67C_Savannah flows src=133.245.5.38 dst=64.86.34.168 protocol=udp sport=5967 dport=28947 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5967 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 28947 protocol: 17 streamName: meraki clientIP: 64.86.34.168 serverIP: 133.245.5.38
Explain this syslog message
<134>Original Address=75.146.93.165 1 1658148303.108180626 M61_MX67C_Savannah flows src=68.11.160.60 dst=6.238.213.155 protocol=udp sport=5967 dport=28947 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5967, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1658148303.108180626 M61_MX67C_Savannah flows src=68.11.160.60 dst=6.238.213.155 protocol=udp sport=5967 dport=28947 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 28947, "protocol": 17, "streamName": "meraki", "clientIP": "6.238.213.155", "serverIP": "68.11.160.60" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1658148303.108180626 M61_MX67C_Savannah flows src=68.11.160.60 dst=6.238.213.155 protocol=udp sport=5967 dport=28947 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1658148303.108180626 M61_MX67C_Savannah flows src=68.11.160.60 dst=6.238.213.155 protocol=udp sport=5967 dport=28947 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5967 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 28947 protocol: 17 streamName: meraki clientIP: 6.238.213.155 serverIP: 68.11.160.60
Explain this syslog message
<134>Original Address=75.146.93.165 1 1658148303.108180626 M61_MX67C_Savannah flows src=190.200.198.184 dst=97.144.31.57 protocol=udp sport=5967 dport=28947 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5967, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1658148303.108180626 M61_MX67C_Savannah flows src=190.200.198.184 dst=97.144.31.57 protocol=udp sport=5967 dport=28947 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 28947, "protocol": 17, "streamName": "meraki", "clientIP": "97.144.31.57", "serverIP": "190.200.198.184" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1658148303.108180626 M61_MX67C_Savannah flows src=190.200.198.184 dst=97.144.31.57 protocol=udp sport=5967 dport=28947 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1658148303.108180626 M61_MX67C_Savannah flows src=190.200.198.184 dst=97.144.31.57 protocol=udp sport=5967 dport=28947 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5967 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 28947 protocol: 17 streamName: meraki clientIP: 97.144.31.57 serverIP: 190.200.198.184
Explain this syslog message
<134>Original Address=75.146.93.165 1 1658148303.148442986 M61_MX67C_Savannah flows src=88.150.56.116 dst=135.179.51.42 protocol=tcp sport=49593 dport=8080 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 8080, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1658148303.148442986 M61_MX67C_Savannah flows src=88.150.56.116 dst=135.179.51.42 protocol=tcp sport=49593 dport=8080 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 49593, "protocol": 6, "streamName": "meraki", "clientIP": "88.150.56.116", "serverIP": "135.179.51.42" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1658148303.148442986 M61_MX67C_Savannah flows src=88.150.56.116 dst=135.179.51.42 protocol=tcp sport=49593 dport=8080 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1658148303.148442986 M61_MX67C_Savannah flows src=88.150.56.116 dst=135.179.51.42 protocol=tcp sport=49593 dport=8080 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 8080 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 49593 protocol: 6 streamName: meraki clientIP: 88.150.56.116 serverIP: 135.179.51.42
Explain this syslog message
<134>Original Address=75.146.93.165 1 1658148303.148442986 M61_MX67C_Savannah flows src=141.222.52.249 dst=144.46.64.118 protocol=tcp sport=49593 dport=8080 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 8080, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1658148303.148442986 M61_MX67C_Savannah flows src=141.222.52.249 dst=144.46.64.118 protocol=tcp sport=49593 dport=8080 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 49593, "protocol": 6, "streamName": "meraki", "clientIP": "141.222.52.249", "serverIP": "144.46.64.118" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1658148303.148442986 M61_MX67C_Savannah flows src=141.222.52.249 dst=144.46.64.118 protocol=tcp sport=49593 dport=8080 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1658148303.148442986 M61_MX67C_Savannah flows src=141.222.52.249 dst=144.46.64.118 protocol=tcp sport=49593 dport=8080 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 8080 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 49593 protocol: 6 streamName: meraki clientIP: 141.222.52.249 serverIP: 144.46.64.118
Explain this syslog message
<134>Original Address=75.146.93.165 1 1658148303.175992546 M61_MX67C_Savannah flows src=206.171.188.115 dst=80.95.25.88 protocol=udp sport=5967 dport=28947 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5967, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1658148303.175992546 M61_MX67C_Savannah flows src=206.171.188.115 dst=80.95.25.88 protocol=udp sport=5967 dport=28947 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 28947, "protocol": 17, "streamName": "meraki", "clientIP": "80.95.25.88", "serverIP": "206.171.188.115" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1658148303.175992546 M61_MX67C_Savannah flows src=206.171.188.115 dst=80.95.25.88 protocol=udp sport=5967 dport=28947 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1658148303.175992546 M61_MX67C_Savannah flows src=206.171.188.115 dst=80.95.25.88 protocol=udp sport=5967 dport=28947 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5967 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 28947 protocol: 17 streamName: meraki clientIP: 80.95.25.88 serverIP: 206.171.188.115
Explain this syslog message
<134>Original Address=75.146.93.165 1 1658148303.175992546 M61_MX67C_Savannah flows src=27.19.208.249 dst=114.244.96.35 protocol=udp sport=5967 dport=28947 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5967, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1658148303.175992546 M61_MX67C_Savannah flows src=27.19.208.249 dst=114.244.96.35 protocol=udp sport=5967 dport=28947 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 28947, "protocol": 17, "streamName": "meraki", "clientIP": "114.244.96.35", "serverIP": "27.19.208.249" }
Create a JSON artifact from the message