input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<134>Original Address=192.168.2.253 1 1658389062.593258665 NORDC_MX400_1 flows src=45.134.53.224 dst=230.209.212.226 protocol=tcp sport=41315 dport=25 pattern: 1 dst 230.209.212.226 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.593258665 NORDC_MX400_1 flows src=45.134.53.224 dst=230.209.212.226 protocol=tcp sport=41315 dport=25 pattern: 1 dst 230.209.212.226 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 41315
protocol: 6
streamName: meraki
clientIP: 45.134.53.224
serverIP: 230.209.212.226 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.611912071 NORDC_MX400_1 flows src=200.81.72.12 dst=207.254.38.196 protocol=tcp sport=63745 dport=25 pattern: 1 dst 207.254.38.196 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658389062.611912071 NORDC_MX400_1 flows src=200.81.72.12 dst=207.254.38.196 protocol=tcp sport=63745 dport=25 pattern: 1 dst 207.254.38.196",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 63745,
"protocol": 6,
"streamName": "meraki",
"clientIP": "200.81.72.12",
"serverIP": "207.254.38.196"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658389062.611912071 NORDC_MX400_1 flows src=200.81.72.12 dst=207.254.38.196 protocol=tcp sport=63745 dport=25 pattern: 1 dst 207.254.38.196 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.611912071 NORDC_MX400_1 flows src=200.81.72.12 dst=207.254.38.196 protocol=tcp sport=63745 dport=25 pattern: 1 dst 207.254.38.196 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 63745
protocol: 6
streamName: meraki
clientIP: 200.81.72.12
serverIP: 207.254.38.196 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.611912071 NORDC_MX400_1 flows src=188.111.152.201 dst=107.30.186.203 protocol=tcp sport=63745 dport=25 pattern: 1 dst 107.30.186.203 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658389062.611912071 NORDC_MX400_1 flows src=188.111.152.201 dst=107.30.186.203 protocol=tcp sport=63745 dport=25 pattern: 1 dst 107.30.186.203",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 63745,
"protocol": 6,
"streamName": "meraki",
"clientIP": "188.111.152.201",
"serverIP": "107.30.186.203"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658389062.611912071 NORDC_MX400_1 flows src=188.111.152.201 dst=107.30.186.203 protocol=tcp sport=63745 dport=25 pattern: 1 dst 107.30.186.203 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.611912071 NORDC_MX400_1 flows src=188.111.152.201 dst=107.30.186.203 protocol=tcp sport=63745 dport=25 pattern: 1 dst 107.30.186.203 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 63745
protocol: 6
streamName: meraki
clientIP: 188.111.152.201
serverIP: 107.30.186.203 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.637083303 NORDC_MX400_1 flows src=160.5.55.21 dst=240.160.141.181 protocol=tcp sport=37890 dport=25 pattern: 1 dst 240.160.141.181 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658389062.637083303 NORDC_MX400_1 flows src=160.5.55.21 dst=240.160.141.181 protocol=tcp sport=37890 dport=25 pattern: 1 dst 240.160.141.181",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 37890,
"protocol": 6,
"streamName": "meraki",
"clientIP": "160.5.55.21",
"serverIP": "240.160.141.181"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658389062.637083303 NORDC_MX400_1 flows src=160.5.55.21 dst=240.160.141.181 protocol=tcp sport=37890 dport=25 pattern: 1 dst 240.160.141.181 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.637083303 NORDC_MX400_1 flows src=160.5.55.21 dst=240.160.141.181 protocol=tcp sport=37890 dport=25 pattern: 1 dst 240.160.141.181 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 37890
protocol: 6
streamName: meraki
clientIP: 160.5.55.21
serverIP: 240.160.141.181 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.637083303 NORDC_MX400_1 flows src=150.40.80.192 dst=203.31.9.141 protocol=tcp sport=37890 dport=25 pattern: 1 dst 203.31.9.141 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658389062.637083303 NORDC_MX400_1 flows src=150.40.80.192 dst=203.31.9.141 protocol=tcp sport=37890 dport=25 pattern: 1 dst 203.31.9.141",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 37890,
"protocol": 6,
"streamName": "meraki",
"clientIP": "150.40.80.192",
"serverIP": "203.31.9.141"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658389062.637083303 NORDC_MX400_1 flows src=150.40.80.192 dst=203.31.9.141 protocol=tcp sport=37890 dport=25 pattern: 1 dst 203.31.9.141 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.637083303 NORDC_MX400_1 flows src=150.40.80.192 dst=203.31.9.141 protocol=tcp sport=37890 dport=25 pattern: 1 dst 203.31.9.141 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 37890
protocol: 6
streamName: meraki
clientIP: 150.40.80.192
serverIP: 203.31.9.141 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.666821676 NORDC_MX400_1 flows src=11.55.129.152 dst=96.79.254.196 protocol=tcp sport=47104 dport=25 pattern: 1 dst 96.79.254.196 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658389062.666821676 NORDC_MX400_1 flows src=11.55.129.152 dst=96.79.254.196 protocol=tcp sport=47104 dport=25 pattern: 1 dst 96.79.254.196",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 47104,
"protocol": 6,
"streamName": "meraki",
"clientIP": "11.55.129.152",
"serverIP": "96.79.254.196"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658389062.666821676 NORDC_MX400_1 flows src=11.55.129.152 dst=96.79.254.196 protocol=tcp sport=47104 dport=25 pattern: 1 dst 96.79.254.196 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.666821676 NORDC_MX400_1 flows src=11.55.129.152 dst=96.79.254.196 protocol=tcp sport=47104 dport=25 pattern: 1 dst 96.79.254.196 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 47104
protocol: 6
streamName: meraki
clientIP: 11.55.129.152
serverIP: 96.79.254.196 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.666821676 NORDC_MX400_1 flows src=200.168.82.184 dst=47.13.74.41 protocol=tcp sport=47104 dport=25 pattern: 1 dst 47.13.74.41 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658389062.666821676 NORDC_MX400_1 flows src=200.168.82.184 dst=47.13.74.41 protocol=tcp sport=47104 dport=25 pattern: 1 dst 47.13.74.41",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 47104,
"protocol": 6,
"streamName": "meraki",
"clientIP": "200.168.82.184",
"serverIP": "47.13.74.41"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658389062.666821676 NORDC_MX400_1 flows src=200.168.82.184 dst=47.13.74.41 protocol=tcp sport=47104 dport=25 pattern: 1 dst 47.13.74.41 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.666821676 NORDC_MX400_1 flows src=200.168.82.184 dst=47.13.74.41 protocol=tcp sport=47104 dport=25 pattern: 1 dst 47.13.74.41 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 47104
protocol: 6
streamName: meraki
clientIP: 200.168.82.184
serverIP: 47.13.74.41 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.749985151 NORDC_MX400_1 flows src=105.254.173.234 dst=70.54.89.255 protocol=tcp sport=58944 dport=25 pattern: 1 dst 70.54.89.255 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658389062.749985151 NORDC_MX400_1 flows src=105.254.173.234 dst=70.54.89.255 protocol=tcp sport=58944 dport=25 pattern: 1 dst 70.54.89.255",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 58944,
"protocol": 6,
"streamName": "meraki",
"clientIP": "105.254.173.234",
"serverIP": "70.54.89.255"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658389062.749985151 NORDC_MX400_1 flows src=105.254.173.234 dst=70.54.89.255 protocol=tcp sport=58944 dport=25 pattern: 1 dst 70.54.89.255 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.749985151 NORDC_MX400_1 flows src=105.254.173.234 dst=70.54.89.255 protocol=tcp sport=58944 dport=25 pattern: 1 dst 70.54.89.255 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 58944
protocol: 6
streamName: meraki
clientIP: 105.254.173.234
serverIP: 70.54.89.255 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.749985151 NORDC_MX400_1 flows src=238.201.68.223 dst=28.117.84.212 protocol=tcp sport=58944 dport=25 pattern: 1 dst 28.117.84.212 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658389062.749985151 NORDC_MX400_1 flows src=238.201.68.223 dst=28.117.84.212 protocol=tcp sport=58944 dport=25 pattern: 1 dst 28.117.84.212",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 58944,
"protocol": 6,
"streamName": "meraki",
"clientIP": "238.201.68.223",
"serverIP": "28.117.84.212"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658389062.749985151 NORDC_MX400_1 flows src=238.201.68.223 dst=28.117.84.212 protocol=tcp sport=58944 dport=25 pattern: 1 dst 28.117.84.212 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.749985151 NORDC_MX400_1 flows src=238.201.68.223 dst=28.117.84.212 protocol=tcp sport=58944 dport=25 pattern: 1 dst 28.117.84.212 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 58944
protocol: 6
streamName: meraki
clientIP: 238.201.68.223
serverIP: 28.117.84.212 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.750532018 NORDC_MX400_1 flows src=117.17.165.160 dst=138.14.141.163 protocol=tcp sport=27872 dport=25 pattern: 1 dst 138.14.141.163 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658389062.750532018 NORDC_MX400_1 flows src=117.17.165.160 dst=138.14.141.163 protocol=tcp sport=27872 dport=25 pattern: 1 dst 138.14.141.163",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 27872,
"protocol": 6,
"streamName": "meraki",
"clientIP": "117.17.165.160",
"serverIP": "138.14.141.163"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658389062.750532018 NORDC_MX400_1 flows src=117.17.165.160 dst=138.14.141.163 protocol=tcp sport=27872 dport=25 pattern: 1 dst 138.14.141.163 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.750532018 NORDC_MX400_1 flows src=117.17.165.160 dst=138.14.141.163 protocol=tcp sport=27872 dport=25 pattern: 1 dst 138.14.141.163 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 27872
protocol: 6
streamName: meraki
clientIP: 117.17.165.160
serverIP: 138.14.141.163 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.750532018 NORDC_MX400_1 flows src=155.32.127.220 dst=157.177.4.205 protocol=tcp sport=27872 dport=25 pattern: 1 dst 157.177.4.205 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658389062.750532018 NORDC_MX400_1 flows src=155.32.127.220 dst=157.177.4.205 protocol=tcp sport=27872 dport=25 pattern: 1 dst 157.177.4.205",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 27872,
"protocol": 6,
"streamName": "meraki",
"clientIP": "155.32.127.220",
"serverIP": "157.177.4.205"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658389062.750532018 NORDC_MX400_1 flows src=155.32.127.220 dst=157.177.4.205 protocol=tcp sport=27872 dport=25 pattern: 1 dst 157.177.4.205 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.750532018 NORDC_MX400_1 flows src=155.32.127.220 dst=157.177.4.205 protocol=tcp sport=27872 dport=25 pattern: 1 dst 157.177.4.205 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 27872
protocol: 6
streamName: meraki
clientIP: 155.32.127.220
serverIP: 157.177.4.205 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658388465.316248620 NORDC_MX400_1 flows src=37.199.74.231 dst=205.74.177.138 protocol=tcp sport=20033 dport=25 pattern: 1 dst 205.74.177.138 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658388465.316248620 NORDC_MX400_1 flows src=37.199.74.231 dst=205.74.177.138 protocol=tcp sport=20033 dport=25 pattern: 1 dst 205.74.177.138",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 20033,
"protocol": 6,
"streamName": "meraki",
"clientIP": "37.199.74.231",
"serverIP": "205.74.177.138"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658388465.316248620 NORDC_MX400_1 flows src=37.199.74.231 dst=205.74.177.138 protocol=tcp sport=20033 dport=25 pattern: 1 dst 205.74.177.138 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658388465.316248620 NORDC_MX400_1 flows src=37.199.74.231 dst=205.74.177.138 protocol=tcp sport=20033 dport=25 pattern: 1 dst 205.74.177.138 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 20033
protocol: 6
streamName: meraki
clientIP: 37.199.74.231
serverIP: 205.74.177.138 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658388465.316248620 NORDC_MX400_1 flows src=201.250.71.139 dst=30.115.184.134 protocol=tcp sport=20033 dport=25 pattern: 1 dst 30.115.184.134 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658388465.316248620 NORDC_MX400_1 flows src=201.250.71.139 dst=30.115.184.134 protocol=tcp sport=20033 dport=25 pattern: 1 dst 30.115.184.134",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 20033,
"protocol": 6,
"streamName": "meraki",
"clientIP": "201.250.71.139",
"serverIP": "30.115.184.134"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658388465.316248620 NORDC_MX400_1 flows src=201.250.71.139 dst=30.115.184.134 protocol=tcp sport=20033 dport=25 pattern: 1 dst 30.115.184.134 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658388465.316248620 NORDC_MX400_1 flows src=201.250.71.139 dst=30.115.184.134 protocol=tcp sport=20033 dport=25 pattern: 1 dst 30.115.184.134 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 20033
protocol: 6
streamName: meraki
clientIP: 201.250.71.139
serverIP: 30.115.184.134 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658388465.316248620 NORDC_MX400_1 flows src=158.229.81.1 dst=149.174.111.249 protocol=tcp sport=20033 dport=25 pattern: 1 dst 149.174.111.249 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658388465.316248620 NORDC_MX400_1 flows src=158.229.81.1 dst=149.174.111.249 protocol=tcp sport=20033 dport=25 pattern: 1 dst 149.174.111.249",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 20033,
"protocol": 6,
"streamName": "meraki",
"clientIP": "158.229.81.1",
"serverIP": "149.174.111.249"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658388465.316248620 NORDC_MX400_1 flows src=158.229.81.1 dst=149.174.111.249 protocol=tcp sport=20033 dport=25 pattern: 1 dst 149.174.111.249 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658388465.316248620 NORDC_MX400_1 flows src=158.229.81.1 dst=149.174.111.249 protocol=tcp sport=20033 dport=25 pattern: 1 dst 149.174.111.249 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 20033
protocol: 6
streamName: meraki
clientIP: 158.229.81.1
serverIP: 149.174.111.249 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658388465.316248620 NORDC_MX400_1 flows src=214.64.12.5 dst=174.71.219.37 protocol=tcp sport=20033 dport=25 pattern: 1 dst 174.71.219.37 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658388465.316248620 NORDC_MX400_1 flows src=214.64.12.5 dst=174.71.219.37 protocol=tcp sport=20033 dport=25 pattern: 1 dst 174.71.219.37",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 20033,
"protocol": 6,
"streamName": "meraki",
"clientIP": "214.64.12.5",
"serverIP": "174.71.219.37"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658388465.316248620 NORDC_MX400_1 flows src=214.64.12.5 dst=174.71.219.37 protocol=tcp sport=20033 dport=25 pattern: 1 dst 174.71.219.37 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658388465.316248620 NORDC_MX400_1 flows src=214.64.12.5 dst=174.71.219.37 protocol=tcp sport=20033 dport=25 pattern: 1 dst 174.71.219.37 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 20033
protocol: 6
streamName: meraki
clientIP: 214.64.12.5
serverIP: 174.71.219.37 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658388465.588953207 NORDC_MX400_1 flows src=211.198.140.138 dst=7.56.252.22 protocol=tcp sport=40577 dport=25 pattern: 1 dst 7.56.252.22 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658388465.588953207 NORDC_MX400_1 flows src=211.198.140.138 dst=7.56.252.22 protocol=tcp sport=40577 dport=25 pattern: 1 dst 7.56.252.22",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 40577,
"protocol": 6,
"streamName": "meraki",
"clientIP": "211.198.140.138",
"serverIP": "7.56.252.22"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658388465.588953207 NORDC_MX400_1 flows src=211.198.140.138 dst=7.56.252.22 protocol=tcp sport=40577 dport=25 pattern: 1 dst 7.56.252.22 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658388465.588953207 NORDC_MX400_1 flows src=211.198.140.138 dst=7.56.252.22 protocol=tcp sport=40577 dport=25 pattern: 1 dst 7.56.252.22 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 40577
protocol: 6
streamName: meraki
clientIP: 211.198.140.138
serverIP: 7.56.252.22 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658388465.588953207 NORDC_MX400_1 flows src=202.6.44.248 dst=171.226.84.16 protocol=tcp sport=40577 dport=25 pattern: 1 dst 171.226.84.16 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658388465.588953207 NORDC_MX400_1 flows src=202.6.44.248 dst=171.226.84.16 protocol=tcp sport=40577 dport=25 pattern: 1 dst 171.226.84.16",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 40577,
"protocol": 6,
"streamName": "meraki",
"clientIP": "202.6.44.248",
"serverIP": "171.226.84.16"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658388465.588953207 NORDC_MX400_1 flows src=202.6.44.248 dst=171.226.84.16 protocol=tcp sport=40577 dport=25 pattern: 1 dst 171.226.84.16 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658388465.588953207 NORDC_MX400_1 flows src=202.6.44.248 dst=171.226.84.16 protocol=tcp sport=40577 dport=25 pattern: 1 dst 171.226.84.16 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 40577
protocol: 6
streamName: meraki
clientIP: 202.6.44.248
serverIP: 171.226.84.16 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658388465.618175011 NORDC_MX400_1 flows src=213.163.32.66 dst=45.117.54.254 protocol=tcp sport=30561 dport=25 pattern: 1 dst 45.117.54.254 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658388465.618175011 NORDC_MX400_1 flows src=213.163.32.66 dst=45.117.54.254 protocol=tcp sport=30561 dport=25 pattern: 1 dst 45.117.54.254",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 30561,
"protocol": 6,
"streamName": "meraki",
"clientIP": "213.163.32.66",
"serverIP": "45.117.54.254"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658388465.618175011 NORDC_MX400_1 flows src=213.163.32.66 dst=45.117.54.254 protocol=tcp sport=30561 dport=25 pattern: 1 dst 45.117.54.254 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658388465.618175011 NORDC_MX400_1 flows src=213.163.32.66 dst=45.117.54.254 protocol=tcp sport=30561 dport=25 pattern: 1 dst 45.117.54.254 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 30561
protocol: 6
streamName: meraki
clientIP: 213.163.32.66
serverIP: 45.117.54.254 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658388465.618175011 NORDC_MX400_1 flows src=222.183.83.33 dst=177.158.133.127 protocol=tcp sport=30561 dport=25 pattern: 1 dst 177.158.133.127 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658388465.618175011 NORDC_MX400_1 flows src=222.183.83.33 dst=177.158.133.127 protocol=tcp sport=30561 dport=25 pattern: 1 dst 177.158.133.127",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 30561,
"protocol": 6,
"streamName": "meraki",
"clientIP": "222.183.83.33",
"serverIP": "177.158.133.127"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658388465.618175011 NORDC_MX400_1 flows src=222.183.83.33 dst=177.158.133.127 protocol=tcp sport=30561 dport=25 pattern: 1 dst 177.158.133.127 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658388465.618175011 NORDC_MX400_1 flows src=222.183.83.33 dst=177.158.133.127 protocol=tcp sport=30561 dport=25 pattern: 1 dst 177.158.133.127 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 30561
protocol: 6
streamName: meraki
clientIP: 222.183.83.33
serverIP: 177.158.133.127 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658388465.498818880 NORDC_MX400_1 flows src=33.200.224.85 dst=85.79.228.178 protocol=tcp sport=32111 dport=25 pattern: 1 dst 85.79.228.178 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658388465.498818880 NORDC_MX400_1 flows src=33.200.224.85 dst=85.79.228.178 protocol=tcp sport=32111 dport=25 pattern: 1 dst 85.79.228.178",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 32111,
"protocol": 6,
"streamName": "meraki",
"clientIP": "33.200.224.85",
"serverIP": "85.79.228.178"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658388465.498818880 NORDC_MX400_1 flows src=33.200.224.85 dst=85.79.228.178 protocol=tcp sport=32111 dport=25 pattern: 1 dst 85.79.228.178 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658388465.498818880 NORDC_MX400_1 flows src=33.200.224.85 dst=85.79.228.178 protocol=tcp sport=32111 dport=25 pattern: 1 dst 85.79.228.178 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 32111
protocol: 6
streamName: meraki
clientIP: 33.200.224.85
serverIP: 85.79.228.178 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658388465.498818880 NORDC_MX400_1 flows src=229.212.217.15 dst=197.173.174.207 protocol=tcp sport=32111 dport=25 pattern: 1 dst 197.173.174.207 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658388465.498818880 NORDC_MX400_1 flows src=229.212.217.15 dst=197.173.174.207 protocol=tcp sport=32111 dport=25 pattern: 1 dst 197.173.174.207",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 32111,
"protocol": 6,
"streamName": "meraki",
"clientIP": "229.212.217.15",
"serverIP": "197.173.174.207"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658388465.498818880 NORDC_MX400_1 flows src=229.212.217.15 dst=197.173.174.207 protocol=tcp sport=32111 dport=25 pattern: 1 dst 197.173.174.207 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658388465.498818880 NORDC_MX400_1 flows src=229.212.217.15 dst=197.173.174.207 protocol=tcp sport=32111 dport=25 pattern: 1 dst 197.173.174.207 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 32111
protocol: 6
streamName: meraki
clientIP: 229.212.217.15
serverIP: 197.173.174.207 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658388465.989254292 NORDC_MX400_1 flows src=177.7.124.114 dst=2.123.102.224 protocol=tcp sport=28171 dport=25 pattern: 1 dst 2.123.102.224 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658388465.989254292 NORDC_MX400_1 flows src=177.7.124.114 dst=2.123.102.224 protocol=tcp sport=28171 dport=25 pattern: 1 dst 2.123.102.224",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 28171,
"protocol": 6,
"streamName": "meraki",
"clientIP": "177.7.124.114",
"serverIP": "2.123.102.224"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658388465.989254292 NORDC_MX400_1 flows src=177.7.124.114 dst=2.123.102.224 protocol=tcp sport=28171 dport=25 pattern: 1 dst 2.123.102.224 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658388465.989254292 NORDC_MX400_1 flows src=177.7.124.114 dst=2.123.102.224 protocol=tcp sport=28171 dport=25 pattern: 1 dst 2.123.102.224 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 28171
protocol: 6
streamName: meraki
clientIP: 177.7.124.114
serverIP: 2.123.102.224 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658388465.989254292 NORDC_MX400_1 flows src=90.240.238.17 dst=209.92.21.42 protocol=tcp sport=28171 dport=25 pattern: 1 dst 209.92.21.42 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658388465.989254292 NORDC_MX400_1 flows src=90.240.238.17 dst=209.92.21.42 protocol=tcp sport=28171 dport=25 pattern: 1 dst 209.92.21.42",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 28171,
"protocol": 6,
"streamName": "meraki",
"clientIP": "90.240.238.17",
"serverIP": "209.92.21.42"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658388465.989254292 NORDC_MX400_1 flows src=90.240.238.17 dst=209.92.21.42 protocol=tcp sport=28171 dport=25 pattern: 1 dst 209.92.21.42 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658388465.989254292 NORDC_MX400_1 flows src=90.240.238.17 dst=209.92.21.42 protocol=tcp sport=28171 dport=25 pattern: 1 dst 209.92.21.42 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 28171
protocol: 6
streamName: meraki
clientIP: 90.240.238.17
serverIP: 209.92.21.42 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658388466.033899037 NORDC_MX400_1 flows src=134.223.101.172 dst=111.166.158.118 protocol=tcp sport=10592 dport=25 pattern: 1 dst 111.166.158.118 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658388466.033899037 NORDC_MX400_1 flows src=134.223.101.172 dst=111.166.158.118 protocol=tcp sport=10592 dport=25 pattern: 1 dst 111.166.158.118",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 10592,
"protocol": 6,
"streamName": "meraki",
"clientIP": "134.223.101.172",
"serverIP": "111.166.158.118"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658388466.033899037 NORDC_MX400_1 flows src=134.223.101.172 dst=111.166.158.118 protocol=tcp sport=10592 dport=25 pattern: 1 dst 111.166.158.118 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658388466.033899037 NORDC_MX400_1 flows src=134.223.101.172 dst=111.166.158.118 protocol=tcp sport=10592 dport=25 pattern: 1 dst 111.166.158.118 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 10592
protocol: 6
streamName: meraki
clientIP: 134.223.101.172
serverIP: 111.166.158.118 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658388466.033899037 NORDC_MX400_1 flows src=12.91.158.98 dst=43.14.183.3 protocol=tcp sport=10592 dport=25 pattern: 1 dst 43.14.183.3 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658388466.033899037 NORDC_MX400_1 flows src=12.91.158.98 dst=43.14.183.3 protocol=tcp sport=10592 dport=25 pattern: 1 dst 43.14.183.3",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 10592,
"protocol": 6,
"streamName": "meraki",
"clientIP": "12.91.158.98",
"serverIP": "43.14.183.3"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658388466.033899037 NORDC_MX400_1 flows src=12.91.158.98 dst=43.14.183.3 protocol=tcp sport=10592 dport=25 pattern: 1 dst 43.14.183.3 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658388466.033899037 NORDC_MX400_1 flows src=12.91.158.98 dst=43.14.183.3 protocol=tcp sport=10592 dport=25 pattern: 1 dst 43.14.183.3 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 10592
protocol: 6
streamName: meraki
clientIP: 12.91.158.98
serverIP: 43.14.183.3 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658388466.059574808 NORDC_MX400_1 flows src=137.15.99.117 dst=48.217.179.227 protocol=tcp sport=22241 dport=25 pattern: 1 dst 48.217.179.227 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658388466.059574808 NORDC_MX400_1 flows src=137.15.99.117 dst=48.217.179.227 protocol=tcp sport=22241 dport=25 pattern: 1 dst 48.217.179.227",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 22241,
"protocol": 6,
"streamName": "meraki",
"clientIP": "137.15.99.117",
"serverIP": "48.217.179.227"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658388466.059574808 NORDC_MX400_1 flows src=137.15.99.117 dst=48.217.179.227 protocol=tcp sport=22241 dport=25 pattern: 1 dst 48.217.179.227 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658388466.059574808 NORDC_MX400_1 flows src=137.15.99.117 dst=48.217.179.227 protocol=tcp sport=22241 dport=25 pattern: 1 dst 48.217.179.227 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 22241
protocol: 6
streamName: meraki
clientIP: 137.15.99.117
serverIP: 48.217.179.227 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658388466.059574808 NORDC_MX400_1 flows src=247.218.185.102 dst=6.60.179.238 protocol=tcp sport=22241 dport=25 pattern: 1 dst 6.60.179.238 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658388466.059574808 NORDC_MX400_1 flows src=247.218.185.102 dst=6.60.179.238 protocol=tcp sport=22241 dport=25 pattern: 1 dst 6.60.179.238",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 22241,
"protocol": 6,
"streamName": "meraki",
"clientIP": "247.218.185.102",
"serverIP": "6.60.179.238"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658388466.059574808 NORDC_MX400_1 flows src=247.218.185.102 dst=6.60.179.238 protocol=tcp sport=22241 dport=25 pattern: 1 dst 6.60.179.238 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658388466.059574808 NORDC_MX400_1 flows src=247.218.185.102 dst=6.60.179.238 protocol=tcp sport=22241 dport=25 pattern: 1 dst 6.60.179.238 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 22241
protocol: 6
streamName: meraki
clientIP: 247.218.185.102
serverIP: 6.60.179.238 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658388466.057363067 NORDC_MX400_1 flows src=3.179.164.242 dst=98.147.211.236 protocol=tcp sport=5249 dport=25 pattern: 1 dst 98.147.211.236 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658388466.057363067 NORDC_MX400_1 flows src=3.179.164.242 dst=98.147.211.236 protocol=tcp sport=5249 dport=25 pattern: 1 dst 98.147.211.236",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 5249,
"protocol": 6,
"streamName": "meraki",
"clientIP": "3.179.164.242",
"serverIP": "98.147.211.236"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658388466.057363067 NORDC_MX400_1 flows src=3.179.164.242 dst=98.147.211.236 protocol=tcp sport=5249 dport=25 pattern: 1 dst 98.147.211.236 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658388466.057363067 NORDC_MX400_1 flows src=3.179.164.242 dst=98.147.211.236 protocol=tcp sport=5249 dport=25 pattern: 1 dst 98.147.211.236 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 5249
protocol: 6
streamName: meraki
clientIP: 3.179.164.242
serverIP: 98.147.211.236 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658388466.057363067 NORDC_MX400_1 flows src=169.109.162.230 dst=134.189.197.157 protocol=tcp sport=5249 dport=25 pattern: 1 dst 134.189.197.157 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658388466.057363067 NORDC_MX400_1 flows src=169.109.162.230 dst=134.189.197.157 protocol=tcp sport=5249 dport=25 pattern: 1 dst 134.189.197.157",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 5249,
"protocol": 6,
"streamName": "meraki",
"clientIP": "169.109.162.230",
"serverIP": "134.189.197.157"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658388466.057363067 NORDC_MX400_1 flows src=169.109.162.230 dst=134.189.197.157 protocol=tcp sport=5249 dport=25 pattern: 1 dst 134.189.197.157 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658388466.057363067 NORDC_MX400_1 flows src=169.109.162.230 dst=134.189.197.157 protocol=tcp sport=5249 dport=25 pattern: 1 dst 134.189.197.157 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 5249
protocol: 6
streamName: meraki
clientIP: 169.109.162.230
serverIP: 134.189.197.157 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658388466.018985302 NORDC_MX400_1 flows src=27.186.10.38 dst=253.219.22.44 protocol=tcp sport=13717 dport=25 pattern: 1 dst 253.219.22.44 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658388466.018985302 NORDC_MX400_1 flows src=27.186.10.38 dst=253.219.22.44 protocol=tcp sport=13717 dport=25 pattern: 1 dst 253.219.22.44",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 13717,
"protocol": 6,
"streamName": "meraki",
"clientIP": "27.186.10.38",
"serverIP": "253.219.22.44"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658388466.018985302 NORDC_MX400_1 flows src=27.186.10.38 dst=253.219.22.44 protocol=tcp sport=13717 dport=25 pattern: 1 dst 253.219.22.44 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658388466.018985302 NORDC_MX400_1 flows src=27.186.10.38 dst=253.219.22.44 protocol=tcp sport=13717 dport=25 pattern: 1 dst 253.219.22.44 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 13717
protocol: 6
streamName: meraki
clientIP: 27.186.10.38
serverIP: 253.219.22.44 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658388466.018985302 NORDC_MX400_1 flows src=101.231.220.65 dst=228.244.98.133 protocol=tcp sport=13717 dport=25 pattern: 1 dst 228.244.98.133 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658388466.018985302 NORDC_MX400_1 flows src=101.231.220.65 dst=228.244.98.133 protocol=tcp sport=13717 dport=25 pattern: 1 dst 228.244.98.133",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 13717,
"protocol": 6,
"streamName": "meraki",
"clientIP": "101.231.220.65",
"serverIP": "228.244.98.133"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658388466.018985302 NORDC_MX400_1 flows src=101.231.220.65 dst=228.244.98.133 protocol=tcp sport=13717 dport=25 pattern: 1 dst 228.244.98.133 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658388466.018985302 NORDC_MX400_1 flows src=101.231.220.65 dst=228.244.98.133 protocol=tcp sport=13717 dport=25 pattern: 1 dst 228.244.98.133 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 13717
protocol: 6
streamName: meraki
clientIP: 101.231.220.65
serverIP: 228.244.98.133 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658388466.098993669 NORDC_MX400_1 flows src=97.21.142.170 dst=144.219.225.134 protocol=tcp sport=23427 dport=25 pattern: 1 dst 144.219.225.134 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658388466.098993669 NORDC_MX400_1 flows src=97.21.142.170 dst=144.219.225.134 protocol=tcp sport=23427 dport=25 pattern: 1 dst 144.219.225.134",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 23427,
"protocol": 6,
"streamName": "meraki",
"clientIP": "97.21.142.170",
"serverIP": "144.219.225.134"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658388466.098993669 NORDC_MX400_1 flows src=97.21.142.170 dst=144.219.225.134 protocol=tcp sport=23427 dport=25 pattern: 1 dst 144.219.225.134 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658388466.098993669 NORDC_MX400_1 flows src=97.21.142.170 dst=144.219.225.134 protocol=tcp sport=23427 dport=25 pattern: 1 dst 144.219.225.134 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 23427
protocol: 6
streamName: meraki
clientIP: 97.21.142.170
serverIP: 144.219.225.134 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658388466.098993669 NORDC_MX400_1 flows src=116.252.106.143 dst=72.213.106.8 protocol=tcp sport=23427 dport=25 pattern: 1 dst 72.213.106.8 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658388466.098993669 NORDC_MX400_1 flows src=116.252.106.143 dst=72.213.106.8 protocol=tcp sport=23427 dport=25 pattern: 1 dst 72.213.106.8",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 23427,
"protocol": 6,
"streamName": "meraki",
"clientIP": "116.252.106.143",
"serverIP": "72.213.106.8"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658388466.098993669 NORDC_MX400_1 flows src=116.252.106.143 dst=72.213.106.8 protocol=tcp sport=23427 dport=25 pattern: 1 dst 72.213.106.8 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658388466.098993669 NORDC_MX400_1 flows src=116.252.106.143 dst=72.213.106.8 protocol=tcp sport=23427 dport=25 pattern: 1 dst 72.213.106.8 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 23427
protocol: 6
streamName: meraki
clientIP: 116.252.106.143
serverIP: 72.213.106.8 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658388466.100141390 NORDC_MX400_1 flows src=173.153.251.108 dst=26.23.222.227 protocol=tcp sport=35329 dport=25 pattern: 1 dst 26.23.222.227 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658388466.100141390 NORDC_MX400_1 flows src=173.153.251.108 dst=26.23.222.227 protocol=tcp sport=35329 dport=25 pattern: 1 dst 26.23.222.227",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 35329,
"protocol": 6,
"streamName": "meraki",
"clientIP": "173.153.251.108",
"serverIP": "26.23.222.227"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658388466.100141390 NORDC_MX400_1 flows src=173.153.251.108 dst=26.23.222.227 protocol=tcp sport=35329 dport=25 pattern: 1 dst 26.23.222.227 | Product: Meraki
Vendor: Cisco | Identify this syslog message |