input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<134>Original Address=192.168.2.253 1 1658389062.593258665 NORDC_MX400_1 flows src=45.134.53.224 dst=230.209.212.226 protocol=tcp sport=41315 dport=25 pattern: 1 dst 230.209.212.226
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658389062.593258665 NORDC_MX400_1 flows src=45.134.53.224 dst=230.209.212.226 protocol=tcp sport=41315 dport=25 pattern: 1 dst 230.209.212.226
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 41315 protocol: 6 streamName: meraki clientIP: 45.134.53.224 serverIP: 230.209.212.226
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658389062.611912071 NORDC_MX400_1 flows src=200.81.72.12 dst=207.254.38.196 protocol=tcp sport=63745 dport=25 pattern: 1 dst 207.254.38.196
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658389062.611912071 NORDC_MX400_1 flows src=200.81.72.12 dst=207.254.38.196 protocol=tcp sport=63745 dport=25 pattern: 1 dst 207.254.38.196", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 63745, "protocol": 6, "streamName": "meraki", "clientIP": "200.81.72.12", "serverIP": "207.254.38.196" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658389062.611912071 NORDC_MX400_1 flows src=200.81.72.12 dst=207.254.38.196 protocol=tcp sport=63745 dport=25 pattern: 1 dst 207.254.38.196
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658389062.611912071 NORDC_MX400_1 flows src=200.81.72.12 dst=207.254.38.196 protocol=tcp sport=63745 dport=25 pattern: 1 dst 207.254.38.196
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 63745 protocol: 6 streamName: meraki clientIP: 200.81.72.12 serverIP: 207.254.38.196
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658389062.611912071 NORDC_MX400_1 flows src=188.111.152.201 dst=107.30.186.203 protocol=tcp sport=63745 dport=25 pattern: 1 dst 107.30.186.203
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658389062.611912071 NORDC_MX400_1 flows src=188.111.152.201 dst=107.30.186.203 protocol=tcp sport=63745 dport=25 pattern: 1 dst 107.30.186.203", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 63745, "protocol": 6, "streamName": "meraki", "clientIP": "188.111.152.201", "serverIP": "107.30.186.203" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658389062.611912071 NORDC_MX400_1 flows src=188.111.152.201 dst=107.30.186.203 protocol=tcp sport=63745 dport=25 pattern: 1 dst 107.30.186.203
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658389062.611912071 NORDC_MX400_1 flows src=188.111.152.201 dst=107.30.186.203 protocol=tcp sport=63745 dport=25 pattern: 1 dst 107.30.186.203
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 63745 protocol: 6 streamName: meraki clientIP: 188.111.152.201 serverIP: 107.30.186.203
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658389062.637083303 NORDC_MX400_1 flows src=160.5.55.21 dst=240.160.141.181 protocol=tcp sport=37890 dport=25 pattern: 1 dst 240.160.141.181
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658389062.637083303 NORDC_MX400_1 flows src=160.5.55.21 dst=240.160.141.181 protocol=tcp sport=37890 dport=25 pattern: 1 dst 240.160.141.181", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 37890, "protocol": 6, "streamName": "meraki", "clientIP": "160.5.55.21", "serverIP": "240.160.141.181" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658389062.637083303 NORDC_MX400_1 flows src=160.5.55.21 dst=240.160.141.181 protocol=tcp sport=37890 dport=25 pattern: 1 dst 240.160.141.181
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658389062.637083303 NORDC_MX400_1 flows src=160.5.55.21 dst=240.160.141.181 protocol=tcp sport=37890 dport=25 pattern: 1 dst 240.160.141.181
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 37890 protocol: 6 streamName: meraki clientIP: 160.5.55.21 serverIP: 240.160.141.181
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658389062.637083303 NORDC_MX400_1 flows src=150.40.80.192 dst=203.31.9.141 protocol=tcp sport=37890 dport=25 pattern: 1 dst 203.31.9.141
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658389062.637083303 NORDC_MX400_1 flows src=150.40.80.192 dst=203.31.9.141 protocol=tcp sport=37890 dport=25 pattern: 1 dst 203.31.9.141", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 37890, "protocol": 6, "streamName": "meraki", "clientIP": "150.40.80.192", "serverIP": "203.31.9.141" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658389062.637083303 NORDC_MX400_1 flows src=150.40.80.192 dst=203.31.9.141 protocol=tcp sport=37890 dport=25 pattern: 1 dst 203.31.9.141
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658389062.637083303 NORDC_MX400_1 flows src=150.40.80.192 dst=203.31.9.141 protocol=tcp sport=37890 dport=25 pattern: 1 dst 203.31.9.141
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 37890 protocol: 6 streamName: meraki clientIP: 150.40.80.192 serverIP: 203.31.9.141
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658389062.666821676 NORDC_MX400_1 flows src=11.55.129.152 dst=96.79.254.196 protocol=tcp sport=47104 dport=25 pattern: 1 dst 96.79.254.196
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658389062.666821676 NORDC_MX400_1 flows src=11.55.129.152 dst=96.79.254.196 protocol=tcp sport=47104 dport=25 pattern: 1 dst 96.79.254.196", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 47104, "protocol": 6, "streamName": "meraki", "clientIP": "11.55.129.152", "serverIP": "96.79.254.196" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658389062.666821676 NORDC_MX400_1 flows src=11.55.129.152 dst=96.79.254.196 protocol=tcp sport=47104 dport=25 pattern: 1 dst 96.79.254.196
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658389062.666821676 NORDC_MX400_1 flows src=11.55.129.152 dst=96.79.254.196 protocol=tcp sport=47104 dport=25 pattern: 1 dst 96.79.254.196
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 47104 protocol: 6 streamName: meraki clientIP: 11.55.129.152 serverIP: 96.79.254.196
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658389062.666821676 NORDC_MX400_1 flows src=200.168.82.184 dst=47.13.74.41 protocol=tcp sport=47104 dport=25 pattern: 1 dst 47.13.74.41
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658389062.666821676 NORDC_MX400_1 flows src=200.168.82.184 dst=47.13.74.41 protocol=tcp sport=47104 dport=25 pattern: 1 dst 47.13.74.41", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 47104, "protocol": 6, "streamName": "meraki", "clientIP": "200.168.82.184", "serverIP": "47.13.74.41" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658389062.666821676 NORDC_MX400_1 flows src=200.168.82.184 dst=47.13.74.41 protocol=tcp sport=47104 dport=25 pattern: 1 dst 47.13.74.41
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658389062.666821676 NORDC_MX400_1 flows src=200.168.82.184 dst=47.13.74.41 protocol=tcp sport=47104 dport=25 pattern: 1 dst 47.13.74.41
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 47104 protocol: 6 streamName: meraki clientIP: 200.168.82.184 serverIP: 47.13.74.41
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658389062.749985151 NORDC_MX400_1 flows src=105.254.173.234 dst=70.54.89.255 protocol=tcp sport=58944 dport=25 pattern: 1 dst 70.54.89.255
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658389062.749985151 NORDC_MX400_1 flows src=105.254.173.234 dst=70.54.89.255 protocol=tcp sport=58944 dport=25 pattern: 1 dst 70.54.89.255", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 58944, "protocol": 6, "streamName": "meraki", "clientIP": "105.254.173.234", "serverIP": "70.54.89.255" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658389062.749985151 NORDC_MX400_1 flows src=105.254.173.234 dst=70.54.89.255 protocol=tcp sport=58944 dport=25 pattern: 1 dst 70.54.89.255
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658389062.749985151 NORDC_MX400_1 flows src=105.254.173.234 dst=70.54.89.255 protocol=tcp sport=58944 dport=25 pattern: 1 dst 70.54.89.255
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 58944 protocol: 6 streamName: meraki clientIP: 105.254.173.234 serverIP: 70.54.89.255
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658389062.749985151 NORDC_MX400_1 flows src=238.201.68.223 dst=28.117.84.212 protocol=tcp sport=58944 dport=25 pattern: 1 dst 28.117.84.212
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658389062.749985151 NORDC_MX400_1 flows src=238.201.68.223 dst=28.117.84.212 protocol=tcp sport=58944 dport=25 pattern: 1 dst 28.117.84.212", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 58944, "protocol": 6, "streamName": "meraki", "clientIP": "238.201.68.223", "serverIP": "28.117.84.212" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658389062.749985151 NORDC_MX400_1 flows src=238.201.68.223 dst=28.117.84.212 protocol=tcp sport=58944 dport=25 pattern: 1 dst 28.117.84.212
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658389062.749985151 NORDC_MX400_1 flows src=238.201.68.223 dst=28.117.84.212 protocol=tcp sport=58944 dport=25 pattern: 1 dst 28.117.84.212
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 58944 protocol: 6 streamName: meraki clientIP: 238.201.68.223 serverIP: 28.117.84.212
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658389062.750532018 NORDC_MX400_1 flows src=117.17.165.160 dst=138.14.141.163 protocol=tcp sport=27872 dport=25 pattern: 1 dst 138.14.141.163
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658389062.750532018 NORDC_MX400_1 flows src=117.17.165.160 dst=138.14.141.163 protocol=tcp sport=27872 dport=25 pattern: 1 dst 138.14.141.163", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 27872, "protocol": 6, "streamName": "meraki", "clientIP": "117.17.165.160", "serverIP": "138.14.141.163" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658389062.750532018 NORDC_MX400_1 flows src=117.17.165.160 dst=138.14.141.163 protocol=tcp sport=27872 dport=25 pattern: 1 dst 138.14.141.163
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658389062.750532018 NORDC_MX400_1 flows src=117.17.165.160 dst=138.14.141.163 protocol=tcp sport=27872 dport=25 pattern: 1 dst 138.14.141.163
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 27872 protocol: 6 streamName: meraki clientIP: 117.17.165.160 serverIP: 138.14.141.163
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658389062.750532018 NORDC_MX400_1 flows src=155.32.127.220 dst=157.177.4.205 protocol=tcp sport=27872 dport=25 pattern: 1 dst 157.177.4.205
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658389062.750532018 NORDC_MX400_1 flows src=155.32.127.220 dst=157.177.4.205 protocol=tcp sport=27872 dport=25 pattern: 1 dst 157.177.4.205", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 27872, "protocol": 6, "streamName": "meraki", "clientIP": "155.32.127.220", "serverIP": "157.177.4.205" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658389062.750532018 NORDC_MX400_1 flows src=155.32.127.220 dst=157.177.4.205 protocol=tcp sport=27872 dport=25 pattern: 1 dst 157.177.4.205
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658389062.750532018 NORDC_MX400_1 flows src=155.32.127.220 dst=157.177.4.205 protocol=tcp sport=27872 dport=25 pattern: 1 dst 157.177.4.205
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 27872 protocol: 6 streamName: meraki clientIP: 155.32.127.220 serverIP: 157.177.4.205
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658388465.316248620 NORDC_MX400_1 flows src=37.199.74.231 dst=205.74.177.138 protocol=tcp sport=20033 dport=25 pattern: 1 dst 205.74.177.138
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658388465.316248620 NORDC_MX400_1 flows src=37.199.74.231 dst=205.74.177.138 protocol=tcp sport=20033 dport=25 pattern: 1 dst 205.74.177.138", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 20033, "protocol": 6, "streamName": "meraki", "clientIP": "37.199.74.231", "serverIP": "205.74.177.138" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658388465.316248620 NORDC_MX400_1 flows src=37.199.74.231 dst=205.74.177.138 protocol=tcp sport=20033 dport=25 pattern: 1 dst 205.74.177.138
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658388465.316248620 NORDC_MX400_1 flows src=37.199.74.231 dst=205.74.177.138 protocol=tcp sport=20033 dport=25 pattern: 1 dst 205.74.177.138
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 20033 protocol: 6 streamName: meraki clientIP: 37.199.74.231 serverIP: 205.74.177.138
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658388465.316248620 NORDC_MX400_1 flows src=201.250.71.139 dst=30.115.184.134 protocol=tcp sport=20033 dport=25 pattern: 1 dst 30.115.184.134
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658388465.316248620 NORDC_MX400_1 flows src=201.250.71.139 dst=30.115.184.134 protocol=tcp sport=20033 dport=25 pattern: 1 dst 30.115.184.134", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 20033, "protocol": 6, "streamName": "meraki", "clientIP": "201.250.71.139", "serverIP": "30.115.184.134" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658388465.316248620 NORDC_MX400_1 flows src=201.250.71.139 dst=30.115.184.134 protocol=tcp sport=20033 dport=25 pattern: 1 dst 30.115.184.134
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658388465.316248620 NORDC_MX400_1 flows src=201.250.71.139 dst=30.115.184.134 protocol=tcp sport=20033 dport=25 pattern: 1 dst 30.115.184.134
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 20033 protocol: 6 streamName: meraki clientIP: 201.250.71.139 serverIP: 30.115.184.134
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658388465.316248620 NORDC_MX400_1 flows src=158.229.81.1 dst=149.174.111.249 protocol=tcp sport=20033 dport=25 pattern: 1 dst 149.174.111.249
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658388465.316248620 NORDC_MX400_1 flows src=158.229.81.1 dst=149.174.111.249 protocol=tcp sport=20033 dport=25 pattern: 1 dst 149.174.111.249", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 20033, "protocol": 6, "streamName": "meraki", "clientIP": "158.229.81.1", "serverIP": "149.174.111.249" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658388465.316248620 NORDC_MX400_1 flows src=158.229.81.1 dst=149.174.111.249 protocol=tcp sport=20033 dport=25 pattern: 1 dst 149.174.111.249
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658388465.316248620 NORDC_MX400_1 flows src=158.229.81.1 dst=149.174.111.249 protocol=tcp sport=20033 dport=25 pattern: 1 dst 149.174.111.249
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 20033 protocol: 6 streamName: meraki clientIP: 158.229.81.1 serverIP: 149.174.111.249
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658388465.316248620 NORDC_MX400_1 flows src=214.64.12.5 dst=174.71.219.37 protocol=tcp sport=20033 dport=25 pattern: 1 dst 174.71.219.37
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658388465.316248620 NORDC_MX400_1 flows src=214.64.12.5 dst=174.71.219.37 protocol=tcp sport=20033 dport=25 pattern: 1 dst 174.71.219.37", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 20033, "protocol": 6, "streamName": "meraki", "clientIP": "214.64.12.5", "serverIP": "174.71.219.37" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658388465.316248620 NORDC_MX400_1 flows src=214.64.12.5 dst=174.71.219.37 protocol=tcp sport=20033 dport=25 pattern: 1 dst 174.71.219.37
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658388465.316248620 NORDC_MX400_1 flows src=214.64.12.5 dst=174.71.219.37 protocol=tcp sport=20033 dport=25 pattern: 1 dst 174.71.219.37
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 20033 protocol: 6 streamName: meraki clientIP: 214.64.12.5 serverIP: 174.71.219.37
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658388465.588953207 NORDC_MX400_1 flows src=211.198.140.138 dst=7.56.252.22 protocol=tcp sport=40577 dport=25 pattern: 1 dst 7.56.252.22
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658388465.588953207 NORDC_MX400_1 flows src=211.198.140.138 dst=7.56.252.22 protocol=tcp sport=40577 dport=25 pattern: 1 dst 7.56.252.22", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 40577, "protocol": 6, "streamName": "meraki", "clientIP": "211.198.140.138", "serverIP": "7.56.252.22" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658388465.588953207 NORDC_MX400_1 flows src=211.198.140.138 dst=7.56.252.22 protocol=tcp sport=40577 dport=25 pattern: 1 dst 7.56.252.22
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658388465.588953207 NORDC_MX400_1 flows src=211.198.140.138 dst=7.56.252.22 protocol=tcp sport=40577 dport=25 pattern: 1 dst 7.56.252.22
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 40577 protocol: 6 streamName: meraki clientIP: 211.198.140.138 serverIP: 7.56.252.22
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658388465.588953207 NORDC_MX400_1 flows src=202.6.44.248 dst=171.226.84.16 protocol=tcp sport=40577 dport=25 pattern: 1 dst 171.226.84.16
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658388465.588953207 NORDC_MX400_1 flows src=202.6.44.248 dst=171.226.84.16 protocol=tcp sport=40577 dport=25 pattern: 1 dst 171.226.84.16", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 40577, "protocol": 6, "streamName": "meraki", "clientIP": "202.6.44.248", "serverIP": "171.226.84.16" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658388465.588953207 NORDC_MX400_1 flows src=202.6.44.248 dst=171.226.84.16 protocol=tcp sport=40577 dport=25 pattern: 1 dst 171.226.84.16
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658388465.588953207 NORDC_MX400_1 flows src=202.6.44.248 dst=171.226.84.16 protocol=tcp sport=40577 dport=25 pattern: 1 dst 171.226.84.16
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 40577 protocol: 6 streamName: meraki clientIP: 202.6.44.248 serverIP: 171.226.84.16
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658388465.618175011 NORDC_MX400_1 flows src=213.163.32.66 dst=45.117.54.254 protocol=tcp sport=30561 dport=25 pattern: 1 dst 45.117.54.254
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658388465.618175011 NORDC_MX400_1 flows src=213.163.32.66 dst=45.117.54.254 protocol=tcp sport=30561 dport=25 pattern: 1 dst 45.117.54.254", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 30561, "protocol": 6, "streamName": "meraki", "clientIP": "213.163.32.66", "serverIP": "45.117.54.254" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658388465.618175011 NORDC_MX400_1 flows src=213.163.32.66 dst=45.117.54.254 protocol=tcp sport=30561 dport=25 pattern: 1 dst 45.117.54.254
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658388465.618175011 NORDC_MX400_1 flows src=213.163.32.66 dst=45.117.54.254 protocol=tcp sport=30561 dport=25 pattern: 1 dst 45.117.54.254
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 30561 protocol: 6 streamName: meraki clientIP: 213.163.32.66 serverIP: 45.117.54.254
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658388465.618175011 NORDC_MX400_1 flows src=222.183.83.33 dst=177.158.133.127 protocol=tcp sport=30561 dport=25 pattern: 1 dst 177.158.133.127
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658388465.618175011 NORDC_MX400_1 flows src=222.183.83.33 dst=177.158.133.127 protocol=tcp sport=30561 dport=25 pattern: 1 dst 177.158.133.127", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 30561, "protocol": 6, "streamName": "meraki", "clientIP": "222.183.83.33", "serverIP": "177.158.133.127" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658388465.618175011 NORDC_MX400_1 flows src=222.183.83.33 dst=177.158.133.127 protocol=tcp sport=30561 dport=25 pattern: 1 dst 177.158.133.127
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658388465.618175011 NORDC_MX400_1 flows src=222.183.83.33 dst=177.158.133.127 protocol=tcp sport=30561 dport=25 pattern: 1 dst 177.158.133.127
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 30561 protocol: 6 streamName: meraki clientIP: 222.183.83.33 serverIP: 177.158.133.127
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658388465.498818880 NORDC_MX400_1 flows src=33.200.224.85 dst=85.79.228.178 protocol=tcp sport=32111 dport=25 pattern: 1 dst 85.79.228.178
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658388465.498818880 NORDC_MX400_1 flows src=33.200.224.85 dst=85.79.228.178 protocol=tcp sport=32111 dport=25 pattern: 1 dst 85.79.228.178", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 32111, "protocol": 6, "streamName": "meraki", "clientIP": "33.200.224.85", "serverIP": "85.79.228.178" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658388465.498818880 NORDC_MX400_1 flows src=33.200.224.85 dst=85.79.228.178 protocol=tcp sport=32111 dport=25 pattern: 1 dst 85.79.228.178
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658388465.498818880 NORDC_MX400_1 flows src=33.200.224.85 dst=85.79.228.178 protocol=tcp sport=32111 dport=25 pattern: 1 dst 85.79.228.178
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 32111 protocol: 6 streamName: meraki clientIP: 33.200.224.85 serverIP: 85.79.228.178
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658388465.498818880 NORDC_MX400_1 flows src=229.212.217.15 dst=197.173.174.207 protocol=tcp sport=32111 dport=25 pattern: 1 dst 197.173.174.207
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658388465.498818880 NORDC_MX400_1 flows src=229.212.217.15 dst=197.173.174.207 protocol=tcp sport=32111 dport=25 pattern: 1 dst 197.173.174.207", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 32111, "protocol": 6, "streamName": "meraki", "clientIP": "229.212.217.15", "serverIP": "197.173.174.207" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658388465.498818880 NORDC_MX400_1 flows src=229.212.217.15 dst=197.173.174.207 protocol=tcp sport=32111 dport=25 pattern: 1 dst 197.173.174.207
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658388465.498818880 NORDC_MX400_1 flows src=229.212.217.15 dst=197.173.174.207 protocol=tcp sport=32111 dport=25 pattern: 1 dst 197.173.174.207
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 32111 protocol: 6 streamName: meraki clientIP: 229.212.217.15 serverIP: 197.173.174.207
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658388465.989254292 NORDC_MX400_1 flows src=177.7.124.114 dst=2.123.102.224 protocol=tcp sport=28171 dport=25 pattern: 1 dst 2.123.102.224
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658388465.989254292 NORDC_MX400_1 flows src=177.7.124.114 dst=2.123.102.224 protocol=tcp sport=28171 dport=25 pattern: 1 dst 2.123.102.224", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 28171, "protocol": 6, "streamName": "meraki", "clientIP": "177.7.124.114", "serverIP": "2.123.102.224" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658388465.989254292 NORDC_MX400_1 flows src=177.7.124.114 dst=2.123.102.224 protocol=tcp sport=28171 dport=25 pattern: 1 dst 2.123.102.224
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658388465.989254292 NORDC_MX400_1 flows src=177.7.124.114 dst=2.123.102.224 protocol=tcp sport=28171 dport=25 pattern: 1 dst 2.123.102.224
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 28171 protocol: 6 streamName: meraki clientIP: 177.7.124.114 serverIP: 2.123.102.224
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658388465.989254292 NORDC_MX400_1 flows src=90.240.238.17 dst=209.92.21.42 protocol=tcp sport=28171 dport=25 pattern: 1 dst 209.92.21.42
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658388465.989254292 NORDC_MX400_1 flows src=90.240.238.17 dst=209.92.21.42 protocol=tcp sport=28171 dport=25 pattern: 1 dst 209.92.21.42", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 28171, "protocol": 6, "streamName": "meraki", "clientIP": "90.240.238.17", "serverIP": "209.92.21.42" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658388465.989254292 NORDC_MX400_1 flows src=90.240.238.17 dst=209.92.21.42 protocol=tcp sport=28171 dport=25 pattern: 1 dst 209.92.21.42
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658388465.989254292 NORDC_MX400_1 flows src=90.240.238.17 dst=209.92.21.42 protocol=tcp sport=28171 dport=25 pattern: 1 dst 209.92.21.42
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 28171 protocol: 6 streamName: meraki clientIP: 90.240.238.17 serverIP: 209.92.21.42
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658388466.033899037 NORDC_MX400_1 flows src=134.223.101.172 dst=111.166.158.118 protocol=tcp sport=10592 dport=25 pattern: 1 dst 111.166.158.118
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658388466.033899037 NORDC_MX400_1 flows src=134.223.101.172 dst=111.166.158.118 protocol=tcp sport=10592 dport=25 pattern: 1 dst 111.166.158.118", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 10592, "protocol": 6, "streamName": "meraki", "clientIP": "134.223.101.172", "serverIP": "111.166.158.118" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658388466.033899037 NORDC_MX400_1 flows src=134.223.101.172 dst=111.166.158.118 protocol=tcp sport=10592 dport=25 pattern: 1 dst 111.166.158.118
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658388466.033899037 NORDC_MX400_1 flows src=134.223.101.172 dst=111.166.158.118 protocol=tcp sport=10592 dport=25 pattern: 1 dst 111.166.158.118
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 10592 protocol: 6 streamName: meraki clientIP: 134.223.101.172 serverIP: 111.166.158.118
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658388466.033899037 NORDC_MX400_1 flows src=12.91.158.98 dst=43.14.183.3 protocol=tcp sport=10592 dport=25 pattern: 1 dst 43.14.183.3
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658388466.033899037 NORDC_MX400_1 flows src=12.91.158.98 dst=43.14.183.3 protocol=tcp sport=10592 dport=25 pattern: 1 dst 43.14.183.3", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 10592, "protocol": 6, "streamName": "meraki", "clientIP": "12.91.158.98", "serverIP": "43.14.183.3" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658388466.033899037 NORDC_MX400_1 flows src=12.91.158.98 dst=43.14.183.3 protocol=tcp sport=10592 dport=25 pattern: 1 dst 43.14.183.3
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658388466.033899037 NORDC_MX400_1 flows src=12.91.158.98 dst=43.14.183.3 protocol=tcp sport=10592 dport=25 pattern: 1 dst 43.14.183.3
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 10592 protocol: 6 streamName: meraki clientIP: 12.91.158.98 serverIP: 43.14.183.3
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658388466.059574808 NORDC_MX400_1 flows src=137.15.99.117 dst=48.217.179.227 protocol=tcp sport=22241 dport=25 pattern: 1 dst 48.217.179.227
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658388466.059574808 NORDC_MX400_1 flows src=137.15.99.117 dst=48.217.179.227 protocol=tcp sport=22241 dport=25 pattern: 1 dst 48.217.179.227", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 22241, "protocol": 6, "streamName": "meraki", "clientIP": "137.15.99.117", "serverIP": "48.217.179.227" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658388466.059574808 NORDC_MX400_1 flows src=137.15.99.117 dst=48.217.179.227 protocol=tcp sport=22241 dport=25 pattern: 1 dst 48.217.179.227
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658388466.059574808 NORDC_MX400_1 flows src=137.15.99.117 dst=48.217.179.227 protocol=tcp sport=22241 dport=25 pattern: 1 dst 48.217.179.227
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 22241 protocol: 6 streamName: meraki clientIP: 137.15.99.117 serverIP: 48.217.179.227
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658388466.059574808 NORDC_MX400_1 flows src=247.218.185.102 dst=6.60.179.238 protocol=tcp sport=22241 dport=25 pattern: 1 dst 6.60.179.238
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658388466.059574808 NORDC_MX400_1 flows src=247.218.185.102 dst=6.60.179.238 protocol=tcp sport=22241 dport=25 pattern: 1 dst 6.60.179.238", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 22241, "protocol": 6, "streamName": "meraki", "clientIP": "247.218.185.102", "serverIP": "6.60.179.238" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658388466.059574808 NORDC_MX400_1 flows src=247.218.185.102 dst=6.60.179.238 protocol=tcp sport=22241 dport=25 pattern: 1 dst 6.60.179.238
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658388466.059574808 NORDC_MX400_1 flows src=247.218.185.102 dst=6.60.179.238 protocol=tcp sport=22241 dport=25 pattern: 1 dst 6.60.179.238
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 22241 protocol: 6 streamName: meraki clientIP: 247.218.185.102 serverIP: 6.60.179.238
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658388466.057363067 NORDC_MX400_1 flows src=3.179.164.242 dst=98.147.211.236 protocol=tcp sport=5249 dport=25 pattern: 1 dst 98.147.211.236
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658388466.057363067 NORDC_MX400_1 flows src=3.179.164.242 dst=98.147.211.236 protocol=tcp sport=5249 dport=25 pattern: 1 dst 98.147.211.236", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 5249, "protocol": 6, "streamName": "meraki", "clientIP": "3.179.164.242", "serverIP": "98.147.211.236" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658388466.057363067 NORDC_MX400_1 flows src=3.179.164.242 dst=98.147.211.236 protocol=tcp sport=5249 dport=25 pattern: 1 dst 98.147.211.236
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658388466.057363067 NORDC_MX400_1 flows src=3.179.164.242 dst=98.147.211.236 protocol=tcp sport=5249 dport=25 pattern: 1 dst 98.147.211.236
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 5249 protocol: 6 streamName: meraki clientIP: 3.179.164.242 serverIP: 98.147.211.236
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658388466.057363067 NORDC_MX400_1 flows src=169.109.162.230 dst=134.189.197.157 protocol=tcp sport=5249 dport=25 pattern: 1 dst 134.189.197.157
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658388466.057363067 NORDC_MX400_1 flows src=169.109.162.230 dst=134.189.197.157 protocol=tcp sport=5249 dport=25 pattern: 1 dst 134.189.197.157", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 5249, "protocol": 6, "streamName": "meraki", "clientIP": "169.109.162.230", "serverIP": "134.189.197.157" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658388466.057363067 NORDC_MX400_1 flows src=169.109.162.230 dst=134.189.197.157 protocol=tcp sport=5249 dport=25 pattern: 1 dst 134.189.197.157
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658388466.057363067 NORDC_MX400_1 flows src=169.109.162.230 dst=134.189.197.157 protocol=tcp sport=5249 dport=25 pattern: 1 dst 134.189.197.157
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 5249 protocol: 6 streamName: meraki clientIP: 169.109.162.230 serverIP: 134.189.197.157
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658388466.018985302 NORDC_MX400_1 flows src=27.186.10.38 dst=253.219.22.44 protocol=tcp sport=13717 dport=25 pattern: 1 dst 253.219.22.44
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658388466.018985302 NORDC_MX400_1 flows src=27.186.10.38 dst=253.219.22.44 protocol=tcp sport=13717 dport=25 pattern: 1 dst 253.219.22.44", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 13717, "protocol": 6, "streamName": "meraki", "clientIP": "27.186.10.38", "serverIP": "253.219.22.44" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658388466.018985302 NORDC_MX400_1 flows src=27.186.10.38 dst=253.219.22.44 protocol=tcp sport=13717 dport=25 pattern: 1 dst 253.219.22.44
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658388466.018985302 NORDC_MX400_1 flows src=27.186.10.38 dst=253.219.22.44 protocol=tcp sport=13717 dport=25 pattern: 1 dst 253.219.22.44
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 13717 protocol: 6 streamName: meraki clientIP: 27.186.10.38 serverIP: 253.219.22.44
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658388466.018985302 NORDC_MX400_1 flows src=101.231.220.65 dst=228.244.98.133 protocol=tcp sport=13717 dport=25 pattern: 1 dst 228.244.98.133
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658388466.018985302 NORDC_MX400_1 flows src=101.231.220.65 dst=228.244.98.133 protocol=tcp sport=13717 dport=25 pattern: 1 dst 228.244.98.133", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 13717, "protocol": 6, "streamName": "meraki", "clientIP": "101.231.220.65", "serverIP": "228.244.98.133" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658388466.018985302 NORDC_MX400_1 flows src=101.231.220.65 dst=228.244.98.133 protocol=tcp sport=13717 dport=25 pattern: 1 dst 228.244.98.133
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658388466.018985302 NORDC_MX400_1 flows src=101.231.220.65 dst=228.244.98.133 protocol=tcp sport=13717 dport=25 pattern: 1 dst 228.244.98.133
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 13717 protocol: 6 streamName: meraki clientIP: 101.231.220.65 serverIP: 228.244.98.133
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658388466.098993669 NORDC_MX400_1 flows src=97.21.142.170 dst=144.219.225.134 protocol=tcp sport=23427 dport=25 pattern: 1 dst 144.219.225.134
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658388466.098993669 NORDC_MX400_1 flows src=97.21.142.170 dst=144.219.225.134 protocol=tcp sport=23427 dport=25 pattern: 1 dst 144.219.225.134", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 23427, "protocol": 6, "streamName": "meraki", "clientIP": "97.21.142.170", "serverIP": "144.219.225.134" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658388466.098993669 NORDC_MX400_1 flows src=97.21.142.170 dst=144.219.225.134 protocol=tcp sport=23427 dport=25 pattern: 1 dst 144.219.225.134
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658388466.098993669 NORDC_MX400_1 flows src=97.21.142.170 dst=144.219.225.134 protocol=tcp sport=23427 dport=25 pattern: 1 dst 144.219.225.134
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 23427 protocol: 6 streamName: meraki clientIP: 97.21.142.170 serverIP: 144.219.225.134
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658388466.098993669 NORDC_MX400_1 flows src=116.252.106.143 dst=72.213.106.8 protocol=tcp sport=23427 dport=25 pattern: 1 dst 72.213.106.8
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658388466.098993669 NORDC_MX400_1 flows src=116.252.106.143 dst=72.213.106.8 protocol=tcp sport=23427 dport=25 pattern: 1 dst 72.213.106.8", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 23427, "protocol": 6, "streamName": "meraki", "clientIP": "116.252.106.143", "serverIP": "72.213.106.8" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658388466.098993669 NORDC_MX400_1 flows src=116.252.106.143 dst=72.213.106.8 protocol=tcp sport=23427 dport=25 pattern: 1 dst 72.213.106.8
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658388466.098993669 NORDC_MX400_1 flows src=116.252.106.143 dst=72.213.106.8 protocol=tcp sport=23427 dport=25 pattern: 1 dst 72.213.106.8
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 23427 protocol: 6 streamName: meraki clientIP: 116.252.106.143 serverIP: 72.213.106.8
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658388466.100141390 NORDC_MX400_1 flows src=173.153.251.108 dst=26.23.222.227 protocol=tcp sport=35329 dport=25 pattern: 1 dst 26.23.222.227
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658388466.100141390 NORDC_MX400_1 flows src=173.153.251.108 dst=26.23.222.227 protocol=tcp sport=35329 dport=25 pattern: 1 dst 26.23.222.227", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 35329, "protocol": 6, "streamName": "meraki", "clientIP": "173.153.251.108", "serverIP": "26.23.222.227" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658388466.100141390 NORDC_MX400_1 flows src=173.153.251.108 dst=26.23.222.227 protocol=tcp sport=35329 dport=25 pattern: 1 dst 26.23.222.227
Product: Meraki Vendor: Cisco
Identify this syslog message