input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<134>Original Address=192.168.2.253 1 1658388466.100141390 NORDC_MX400_1 flows src=173.153.251.108 dst=26.23.222.227 protocol=tcp sport=35329 dport=25 pattern: 1 dst 26.23.222.227 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 35329
protocol: 6
streamName: meraki
clientIP: 173.153.251.108
serverIP: 26.23.222.227 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658388466.100141390 NORDC_MX400_1 flows src=240.176.220.187 dst=193.55.106.132 protocol=tcp sport=35329 dport=25 pattern: 1 dst 193.55.106.132 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658388466.100141390 NORDC_MX400_1 flows src=240.176.220.187 dst=193.55.106.132 protocol=tcp sport=35329 dport=25 pattern: 1 dst 193.55.106.132",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 35329,
"protocol": 6,
"streamName": "meraki",
"clientIP": "240.176.220.187",
"serverIP": "193.55.106.132"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658388466.100141390 NORDC_MX400_1 flows src=240.176.220.187 dst=193.55.106.132 protocol=tcp sport=35329 dport=25 pattern: 1 dst 193.55.106.132 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658388466.100141390 NORDC_MX400_1 flows src=240.176.220.187 dst=193.55.106.132 protocol=tcp sport=35329 dport=25 pattern: 1 dst 193.55.106.132 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 35329
protocol: 6
streamName: meraki
clientIP: 240.176.220.187
serverIP: 193.55.106.132 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.917361305 NORDC_MX400_1 flows src=6.195.103.185 dst=141.69.35.190 protocol=tcp sport=35506 dport=25 pattern: 1 dst 141.69.35.190 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656401011.917361305 NORDC_MX400_1 flows src=6.195.103.185 dst=141.69.35.190 protocol=tcp sport=35506 dport=25 pattern: 1 dst 141.69.35.190",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 35506,
"protocol": 6,
"streamName": "meraki",
"clientIP": "6.195.103.185",
"serverIP": "141.69.35.190"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656401011.917361305 NORDC_MX400_1 flows src=6.195.103.185 dst=141.69.35.190 protocol=tcp sport=35506 dport=25 pattern: 1 dst 141.69.35.190 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.917361305 NORDC_MX400_1 flows src=6.195.103.185 dst=141.69.35.190 protocol=tcp sport=35506 dport=25 pattern: 1 dst 141.69.35.190 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 35506
protocol: 6
streamName: meraki
clientIP: 6.195.103.185
serverIP: 141.69.35.190 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.917361305 NORDC_MX400_1 flows src=199.5.139.82 dst=117.215.41.137 protocol=tcp sport=35506 dport=25 pattern: 1 dst 117.215.41.137 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656401011.917361305 NORDC_MX400_1 flows src=199.5.139.82 dst=117.215.41.137 protocol=tcp sport=35506 dport=25 pattern: 1 dst 117.215.41.137",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 35506,
"protocol": 6,
"streamName": "meraki",
"clientIP": "199.5.139.82",
"serverIP": "117.215.41.137"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656401011.917361305 NORDC_MX400_1 flows src=199.5.139.82 dst=117.215.41.137 protocol=tcp sport=35506 dport=25 pattern: 1 dst 117.215.41.137 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.917361305 NORDC_MX400_1 flows src=199.5.139.82 dst=117.215.41.137 protocol=tcp sport=35506 dport=25 pattern: 1 dst 117.215.41.137 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 35506
protocol: 6
streamName: meraki
clientIP: 199.5.139.82
serverIP: 117.215.41.137 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.380407495 NORDC_MX400_1 flows src=29.105.246.189 dst=14.64.244.178 protocol=tcp sport=13568 dport=25 pattern: 1 dst 14.64.244.178 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656401011.380407495 NORDC_MX400_1 flows src=29.105.246.189 dst=14.64.244.178 protocol=tcp sport=13568 dport=25 pattern: 1 dst 14.64.244.178",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 13568,
"protocol": 6,
"streamName": "meraki",
"clientIP": "29.105.246.189",
"serverIP": "14.64.244.178"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656401011.380407495 NORDC_MX400_1 flows src=29.105.246.189 dst=14.64.244.178 protocol=tcp sport=13568 dport=25 pattern: 1 dst 14.64.244.178 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.380407495 NORDC_MX400_1 flows src=29.105.246.189 dst=14.64.244.178 protocol=tcp sport=13568 dport=25 pattern: 1 dst 14.64.244.178 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 13568
protocol: 6
streamName: meraki
clientIP: 29.105.246.189
serverIP: 14.64.244.178 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.380407495 NORDC_MX400_1 flows src=240.23.141.108 dst=184.241.201.18 protocol=tcp sport=13568 dport=25 pattern: 1 dst 184.241.201.18 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656401011.380407495 NORDC_MX400_1 flows src=240.23.141.108 dst=184.241.201.18 protocol=tcp sport=13568 dport=25 pattern: 1 dst 184.241.201.18",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 13568,
"protocol": 6,
"streamName": "meraki",
"clientIP": "240.23.141.108",
"serverIP": "184.241.201.18"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656401011.380407495 NORDC_MX400_1 flows src=240.23.141.108 dst=184.241.201.18 protocol=tcp sport=13568 dport=25 pattern: 1 dst 184.241.201.18 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.380407495 NORDC_MX400_1 flows src=240.23.141.108 dst=184.241.201.18 protocol=tcp sport=13568 dport=25 pattern: 1 dst 184.241.201.18 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 13568
protocol: 6
streamName: meraki
clientIP: 240.23.141.108
serverIP: 184.241.201.18 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656401010.799826797 NORDC_MX400_1 flows src=252.118.38.250 dst=37.207.215.73 protocol=tcp sport=22240 dport=25 pattern: 1 dst 37.207.215.73 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656401010.799826797 NORDC_MX400_1 flows src=252.118.38.250 dst=37.207.215.73 protocol=tcp sport=22240 dport=25 pattern: 1 dst 37.207.215.73",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 22240,
"protocol": 6,
"streamName": "meraki",
"clientIP": "252.118.38.250",
"serverIP": "37.207.215.73"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656401010.799826797 NORDC_MX400_1 flows src=252.118.38.250 dst=37.207.215.73 protocol=tcp sport=22240 dport=25 pattern: 1 dst 37.207.215.73 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656401010.799826797 NORDC_MX400_1 flows src=252.118.38.250 dst=37.207.215.73 protocol=tcp sport=22240 dport=25 pattern: 1 dst 37.207.215.73 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 22240
protocol: 6
streamName: meraki
clientIP: 252.118.38.250
serverIP: 37.207.215.73 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656401010.799826797 NORDC_MX400_1 flows src=9.62.236.87 dst=94.37.168.194 protocol=tcp sport=22240 dport=25 pattern: 1 dst 94.37.168.194 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656401010.799826797 NORDC_MX400_1 flows src=9.62.236.87 dst=94.37.168.194 protocol=tcp sport=22240 dport=25 pattern: 1 dst 94.37.168.194",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 22240,
"protocol": 6,
"streamName": "meraki",
"clientIP": "9.62.236.87",
"serverIP": "94.37.168.194"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656401010.799826797 NORDC_MX400_1 flows src=9.62.236.87 dst=94.37.168.194 protocol=tcp sport=22240 dport=25 pattern: 1 dst 94.37.168.194 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656401010.799826797 NORDC_MX400_1 flows src=9.62.236.87 dst=94.37.168.194 protocol=tcp sport=22240 dport=25 pattern: 1 dst 94.37.168.194 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 22240
protocol: 6
streamName: meraki
clientIP: 9.62.236.87
serverIP: 94.37.168.194 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.281482814 NORDC_MX400_1 flows src=207.236.106.149 dst=188.21.7.211 protocol=tcp sport=52545 dport=25 pattern: 1 dst 188.21.7.211 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656401011.281482814 NORDC_MX400_1 flows src=207.236.106.149 dst=188.21.7.211 protocol=tcp sport=52545 dport=25 pattern: 1 dst 188.21.7.211",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 52545,
"protocol": 6,
"streamName": "meraki",
"clientIP": "207.236.106.149",
"serverIP": "188.21.7.211"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656401011.281482814 NORDC_MX400_1 flows src=207.236.106.149 dst=188.21.7.211 protocol=tcp sport=52545 dport=25 pattern: 1 dst 188.21.7.211 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.281482814 NORDC_MX400_1 flows src=207.236.106.149 dst=188.21.7.211 protocol=tcp sport=52545 dport=25 pattern: 1 dst 188.21.7.211 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 52545
protocol: 6
streamName: meraki
clientIP: 207.236.106.149
serverIP: 188.21.7.211 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.281482814 NORDC_MX400_1 flows src=55.128.28.227 dst=230.166.42.202 protocol=tcp sport=52545 dport=25 pattern: 1 dst 230.166.42.202 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656401011.281482814 NORDC_MX400_1 flows src=55.128.28.227 dst=230.166.42.202 protocol=tcp sport=52545 dport=25 pattern: 1 dst 230.166.42.202",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 52545,
"protocol": 6,
"streamName": "meraki",
"clientIP": "55.128.28.227",
"serverIP": "230.166.42.202"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656401011.281482814 NORDC_MX400_1 flows src=55.128.28.227 dst=230.166.42.202 protocol=tcp sport=52545 dport=25 pattern: 1 dst 230.166.42.202 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.281482814 NORDC_MX400_1 flows src=55.128.28.227 dst=230.166.42.202 protocol=tcp sport=52545 dport=25 pattern: 1 dst 230.166.42.202 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 52545
protocol: 6
streamName: meraki
clientIP: 55.128.28.227
serverIP: 230.166.42.202 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.317572592 NORDC_MX400_1 flows src=172.83.92.78 dst=76.254.41.35 protocol=tcp sport=35649 dport=25 pattern: 1 dst 76.254.41.35 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656401011.317572592 NORDC_MX400_1 flows src=172.83.92.78 dst=76.254.41.35 protocol=tcp sport=35649 dport=25 pattern: 1 dst 76.254.41.35",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 35649,
"protocol": 6,
"streamName": "meraki",
"clientIP": "172.83.92.78",
"serverIP": "76.254.41.35"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656401011.317572592 NORDC_MX400_1 flows src=172.83.92.78 dst=76.254.41.35 protocol=tcp sport=35649 dport=25 pattern: 1 dst 76.254.41.35 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.317572592 NORDC_MX400_1 flows src=172.83.92.78 dst=76.254.41.35 protocol=tcp sport=35649 dport=25 pattern: 1 dst 76.254.41.35 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 35649
protocol: 6
streamName: meraki
clientIP: 172.83.92.78
serverIP: 76.254.41.35 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.317572592 NORDC_MX400_1 flows src=200.138.152.179 dst=42.17.28.177 protocol=tcp sport=35649 dport=25 pattern: 1 dst 42.17.28.177 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656401011.317572592 NORDC_MX400_1 flows src=200.138.152.179 dst=42.17.28.177 protocol=tcp sport=35649 dport=25 pattern: 1 dst 42.17.28.177",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 35649,
"protocol": 6,
"streamName": "meraki",
"clientIP": "200.138.152.179",
"serverIP": "42.17.28.177"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656401011.317572592 NORDC_MX400_1 flows src=200.138.152.179 dst=42.17.28.177 protocol=tcp sport=35649 dport=25 pattern: 1 dst 42.17.28.177 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.317572592 NORDC_MX400_1 flows src=200.138.152.179 dst=42.17.28.177 protocol=tcp sport=35649 dport=25 pattern: 1 dst 42.17.28.177 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 35649
protocol: 6
streamName: meraki
clientIP: 200.138.152.179
serverIP: 42.17.28.177 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.328068290 NORDC_MX400_1 flows src=30.133.146.103 dst=132.252.120.75 protocol=tcp sport=6090 dport=25 pattern: 1 dst 132.252.120.75 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656401011.328068290 NORDC_MX400_1 flows src=30.133.146.103 dst=132.252.120.75 protocol=tcp sport=6090 dport=25 pattern: 1 dst 132.252.120.75",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6090,
"protocol": 6,
"streamName": "meraki",
"clientIP": "30.133.146.103",
"serverIP": "132.252.120.75"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656401011.328068290 NORDC_MX400_1 flows src=30.133.146.103 dst=132.252.120.75 protocol=tcp sport=6090 dport=25 pattern: 1 dst 132.252.120.75 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.328068290 NORDC_MX400_1 flows src=30.133.146.103 dst=132.252.120.75 protocol=tcp sport=6090 dport=25 pattern: 1 dst 132.252.120.75 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6090
protocol: 6
streamName: meraki
clientIP: 30.133.146.103
serverIP: 132.252.120.75 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.328068290 NORDC_MX400_1 flows src=209.205.215.205 dst=64.27.120.88 protocol=tcp sport=6090 dport=25 pattern: 1 dst 64.27.120.88 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656401011.328068290 NORDC_MX400_1 flows src=209.205.215.205 dst=64.27.120.88 protocol=tcp sport=6090 dport=25 pattern: 1 dst 64.27.120.88",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6090,
"protocol": 6,
"streamName": "meraki",
"clientIP": "209.205.215.205",
"serverIP": "64.27.120.88"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656401011.328068290 NORDC_MX400_1 flows src=209.205.215.205 dst=64.27.120.88 protocol=tcp sport=6090 dport=25 pattern: 1 dst 64.27.120.88 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.328068290 NORDC_MX400_1 flows src=209.205.215.205 dst=64.27.120.88 protocol=tcp sport=6090 dport=25 pattern: 1 dst 64.27.120.88 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6090
protocol: 6
streamName: meraki
clientIP: 209.205.215.205
serverIP: 64.27.120.88 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.328754794 NORDC_MX400_1 flows src=254.99.187.223 dst=190.191.24.223 protocol=tcp sport=6316 dport=25 pattern: 1 dst 190.191.24.223 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656401011.328754794 NORDC_MX400_1 flows src=254.99.187.223 dst=190.191.24.223 protocol=tcp sport=6316 dport=25 pattern: 1 dst 190.191.24.223",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6316,
"protocol": 6,
"streamName": "meraki",
"clientIP": "254.99.187.223",
"serverIP": "190.191.24.223"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656401011.328754794 NORDC_MX400_1 flows src=254.99.187.223 dst=190.191.24.223 protocol=tcp sport=6316 dport=25 pattern: 1 dst 190.191.24.223 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.328754794 NORDC_MX400_1 flows src=254.99.187.223 dst=190.191.24.223 protocol=tcp sport=6316 dport=25 pattern: 1 dst 190.191.24.223 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6316
protocol: 6
streamName: meraki
clientIP: 254.99.187.223
serverIP: 190.191.24.223 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.328754794 NORDC_MX400_1 flows src=29.78.54.85 dst=187.182.38.155 protocol=tcp sport=6316 dport=25 pattern: 1 dst 187.182.38.155 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656401011.328754794 NORDC_MX400_1 flows src=29.78.54.85 dst=187.182.38.155 protocol=tcp sport=6316 dport=25 pattern: 1 dst 187.182.38.155",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6316,
"protocol": 6,
"streamName": "meraki",
"clientIP": "29.78.54.85",
"serverIP": "187.182.38.155"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656401011.328754794 NORDC_MX400_1 flows src=29.78.54.85 dst=187.182.38.155 protocol=tcp sport=6316 dport=25 pattern: 1 dst 187.182.38.155 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.328754794 NORDC_MX400_1 flows src=29.78.54.85 dst=187.182.38.155 protocol=tcp sport=6316 dport=25 pattern: 1 dst 187.182.38.155 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6316
protocol: 6
streamName: meraki
clientIP: 29.78.54.85
serverIP: 187.182.38.155 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.328743914 NORDC_MX400_1 flows src=96.43.71.35 dst=207.146.21.200 protocol=tcp sport=63168 dport=25 pattern: 1 dst 207.146.21.200 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656401011.328743914 NORDC_MX400_1 flows src=96.43.71.35 dst=207.146.21.200 protocol=tcp sport=63168 dport=25 pattern: 1 dst 207.146.21.200",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 63168,
"protocol": 6,
"streamName": "meraki",
"clientIP": "96.43.71.35",
"serverIP": "207.146.21.200"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656401011.328743914 NORDC_MX400_1 flows src=96.43.71.35 dst=207.146.21.200 protocol=tcp sport=63168 dport=25 pattern: 1 dst 207.146.21.200 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.328743914 NORDC_MX400_1 flows src=96.43.71.35 dst=207.146.21.200 protocol=tcp sport=63168 dport=25 pattern: 1 dst 207.146.21.200 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 63168
protocol: 6
streamName: meraki
clientIP: 96.43.71.35
serverIP: 207.146.21.200 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.328743914 NORDC_MX400_1 flows src=21.145.114.90 dst=141.10.47.193 protocol=tcp sport=63168 dport=25 pattern: 1 dst 141.10.47.193 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656401011.328743914 NORDC_MX400_1 flows src=21.145.114.90 dst=141.10.47.193 protocol=tcp sport=63168 dport=25 pattern: 1 dst 141.10.47.193",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 63168,
"protocol": 6,
"streamName": "meraki",
"clientIP": "21.145.114.90",
"serverIP": "141.10.47.193"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656401011.328743914 NORDC_MX400_1 flows src=21.145.114.90 dst=141.10.47.193 protocol=tcp sport=63168 dport=25 pattern: 1 dst 141.10.47.193 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.328743914 NORDC_MX400_1 flows src=21.145.114.90 dst=141.10.47.193 protocol=tcp sport=63168 dport=25 pattern: 1 dst 141.10.47.193 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 63168
protocol: 6
streamName: meraki
clientIP: 21.145.114.90
serverIP: 141.10.47.193 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.331979703 NORDC_MX400_1 flows src=10.194.198.202 dst=122.117.28.241 protocol=tcp sport=55841 dport=25 pattern: 1 dst 122.117.28.241 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656401011.331979703 NORDC_MX400_1 flows src=10.194.198.202 dst=122.117.28.241 protocol=tcp sport=55841 dport=25 pattern: 1 dst 122.117.28.241",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 55841,
"protocol": 6,
"streamName": "meraki",
"clientIP": "10.194.198.202",
"serverIP": "122.117.28.241"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656401011.331979703 NORDC_MX400_1 flows src=10.194.198.202 dst=122.117.28.241 protocol=tcp sport=55841 dport=25 pattern: 1 dst 122.117.28.241 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.331979703 NORDC_MX400_1 flows src=10.194.198.202 dst=122.117.28.241 protocol=tcp sport=55841 dport=25 pattern: 1 dst 122.117.28.241 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 55841
protocol: 6
streamName: meraki
clientIP: 10.194.198.202
serverIP: 122.117.28.241 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.331979703 NORDC_MX400_1 flows src=58.218.177.187 dst=38.115.174.104 protocol=tcp sport=55841 dport=25 pattern: 1 dst 38.115.174.104 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656401011.331979703 NORDC_MX400_1 flows src=58.218.177.187 dst=38.115.174.104 protocol=tcp sport=55841 dport=25 pattern: 1 dst 38.115.174.104",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 55841,
"protocol": 6,
"streamName": "meraki",
"clientIP": "58.218.177.187",
"serverIP": "38.115.174.104"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656401011.331979703 NORDC_MX400_1 flows src=58.218.177.187 dst=38.115.174.104 protocol=tcp sport=55841 dport=25 pattern: 1 dst 38.115.174.104 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.331979703 NORDC_MX400_1 flows src=58.218.177.187 dst=38.115.174.104 protocol=tcp sport=55841 dport=25 pattern: 1 dst 38.115.174.104 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 55841
protocol: 6
streamName: meraki
clientIP: 58.218.177.187
serverIP: 38.115.174.104 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.332530389 NORDC_MX400_1 flows src=67.55.209.163 dst=205.242.211.174 protocol=tcp sport=53377 dport=25 pattern: 1 dst 205.242.211.174 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656401011.332530389 NORDC_MX400_1 flows src=67.55.209.163 dst=205.242.211.174 protocol=tcp sport=53377 dport=25 pattern: 1 dst 205.242.211.174",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 53377,
"protocol": 6,
"streamName": "meraki",
"clientIP": "67.55.209.163",
"serverIP": "205.242.211.174"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656401011.332530389 NORDC_MX400_1 flows src=67.55.209.163 dst=205.242.211.174 protocol=tcp sport=53377 dport=25 pattern: 1 dst 205.242.211.174 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.332530389 NORDC_MX400_1 flows src=67.55.209.163 dst=205.242.211.174 protocol=tcp sport=53377 dport=25 pattern: 1 dst 205.242.211.174 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 53377
protocol: 6
streamName: meraki
clientIP: 67.55.209.163
serverIP: 205.242.211.174 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.332530389 NORDC_MX400_1 flows src=249.55.23.221 dst=234.242.160.86 protocol=tcp sport=53377 dport=25 pattern: 1 dst 234.242.160.86 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656401011.332530389 NORDC_MX400_1 flows src=249.55.23.221 dst=234.242.160.86 protocol=tcp sport=53377 dport=25 pattern: 1 dst 234.242.160.86",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 53377,
"protocol": 6,
"streamName": "meraki",
"clientIP": "249.55.23.221",
"serverIP": "234.242.160.86"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656401011.332530389 NORDC_MX400_1 flows src=249.55.23.221 dst=234.242.160.86 protocol=tcp sport=53377 dport=25 pattern: 1 dst 234.242.160.86 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.332530389 NORDC_MX400_1 flows src=249.55.23.221 dst=234.242.160.86 protocol=tcp sport=53377 dport=25 pattern: 1 dst 234.242.160.86 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 53377
protocol: 6
streamName: meraki
clientIP: 249.55.23.221
serverIP: 234.242.160.86 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.518481384 NORDC_MX400_1 flows src=84.158.135.165 dst=46.70.12.225 protocol=tcp sport=6375 dport=25 pattern: 1 dst 46.70.12.225 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656401011.518481384 NORDC_MX400_1 flows src=84.158.135.165 dst=46.70.12.225 protocol=tcp sport=6375 dport=25 pattern: 1 dst 46.70.12.225",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6375,
"protocol": 6,
"streamName": "meraki",
"clientIP": "84.158.135.165",
"serverIP": "46.70.12.225"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656401011.518481384 NORDC_MX400_1 flows src=84.158.135.165 dst=46.70.12.225 protocol=tcp sport=6375 dport=25 pattern: 1 dst 46.70.12.225 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.518481384 NORDC_MX400_1 flows src=84.158.135.165 dst=46.70.12.225 protocol=tcp sport=6375 dport=25 pattern: 1 dst 46.70.12.225 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6375
protocol: 6
streamName: meraki
clientIP: 84.158.135.165
serverIP: 46.70.12.225 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.518481384 NORDC_MX400_1 flows src=15.93.197.245 dst=150.123.160.112 protocol=tcp sport=6375 dport=25 pattern: 1 dst 150.123.160.112 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656401011.518481384 NORDC_MX400_1 flows src=15.93.197.245 dst=150.123.160.112 protocol=tcp sport=6375 dport=25 pattern: 1 dst 150.123.160.112",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6375,
"protocol": 6,
"streamName": "meraki",
"clientIP": "15.93.197.245",
"serverIP": "150.123.160.112"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656401011.518481384 NORDC_MX400_1 flows src=15.93.197.245 dst=150.123.160.112 protocol=tcp sport=6375 dport=25 pattern: 1 dst 150.123.160.112 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.518481384 NORDC_MX400_1 flows src=15.93.197.245 dst=150.123.160.112 protocol=tcp sport=6375 dport=25 pattern: 1 dst 150.123.160.112 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6375
protocol: 6
streamName: meraki
clientIP: 15.93.197.245
serverIP: 150.123.160.112 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.548456893 NORDC_MX400_1 flows src=54.9.40.191 dst=73.230.137.74 protocol=tcp sport=6243 dport=25 pattern: 1 dst 73.230.137.74 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656401011.548456893 NORDC_MX400_1 flows src=54.9.40.191 dst=73.230.137.74 protocol=tcp sport=6243 dport=25 pattern: 1 dst 73.230.137.74",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6243,
"protocol": 6,
"streamName": "meraki",
"clientIP": "54.9.40.191",
"serverIP": "73.230.137.74"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656401011.548456893 NORDC_MX400_1 flows src=54.9.40.191 dst=73.230.137.74 protocol=tcp sport=6243 dport=25 pattern: 1 dst 73.230.137.74 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.548456893 NORDC_MX400_1 flows src=54.9.40.191 dst=73.230.137.74 protocol=tcp sport=6243 dport=25 pattern: 1 dst 73.230.137.74 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6243
protocol: 6
streamName: meraki
clientIP: 54.9.40.191
serverIP: 73.230.137.74 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.548456893 NORDC_MX400_1 flows src=27.145.108.28 dst=189.150.15.240 protocol=tcp sport=6243 dport=25 pattern: 1 dst 189.150.15.240 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656401011.548456893 NORDC_MX400_1 flows src=27.145.108.28 dst=189.150.15.240 protocol=tcp sport=6243 dport=25 pattern: 1 dst 189.150.15.240",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6243,
"protocol": 6,
"streamName": "meraki",
"clientIP": "27.145.108.28",
"serverIP": "189.150.15.240"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656401011.548456893 NORDC_MX400_1 flows src=27.145.108.28 dst=189.150.15.240 protocol=tcp sport=6243 dport=25 pattern: 1 dst 189.150.15.240 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.548456893 NORDC_MX400_1 flows src=27.145.108.28 dst=189.150.15.240 protocol=tcp sport=6243 dport=25 pattern: 1 dst 189.150.15.240 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6243
protocol: 6
streamName: meraki
clientIP: 27.145.108.28
serverIP: 189.150.15.240 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.674611159 NORDC_MX400_1 flows src=19.73.55.114 dst=4.222.170.200 protocol=tcp sport=56030 dport=25 pattern: 1 dst 4.222.170.200 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656401011.674611159 NORDC_MX400_1 flows src=19.73.55.114 dst=4.222.170.200 protocol=tcp sport=56030 dport=25 pattern: 1 dst 4.222.170.200",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 56030,
"protocol": 6,
"streamName": "meraki",
"clientIP": "19.73.55.114",
"serverIP": "4.222.170.200"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656401011.674611159 NORDC_MX400_1 flows src=19.73.55.114 dst=4.222.170.200 protocol=tcp sport=56030 dport=25 pattern: 1 dst 4.222.170.200 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.674611159 NORDC_MX400_1 flows src=19.73.55.114 dst=4.222.170.200 protocol=tcp sport=56030 dport=25 pattern: 1 dst 4.222.170.200 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 56030
protocol: 6
streamName: meraki
clientIP: 19.73.55.114
serverIP: 4.222.170.200 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.674611159 NORDC_MX400_1 flows src=179.137.25.133 dst=70.245.157.202 protocol=tcp sport=56030 dport=25 pattern: 1 dst 70.245.157.202 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656401011.674611159 NORDC_MX400_1 flows src=179.137.25.133 dst=70.245.157.202 protocol=tcp sport=56030 dport=25 pattern: 1 dst 70.245.157.202",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 56030,
"protocol": 6,
"streamName": "meraki",
"clientIP": "179.137.25.133",
"serverIP": "70.245.157.202"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656401011.674611159 NORDC_MX400_1 flows src=179.137.25.133 dst=70.245.157.202 protocol=tcp sport=56030 dport=25 pattern: 1 dst 70.245.157.202 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.674611159 NORDC_MX400_1 flows src=179.137.25.133 dst=70.245.157.202 protocol=tcp sport=56030 dport=25 pattern: 1 dst 70.245.157.202 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 56030
protocol: 6
streamName: meraki
clientIP: 179.137.25.133
serverIP: 70.245.157.202 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.917361305 NORDC_MX400_1 flows src=138.130.205.111 dst=7.3.142.91 protocol=tcp sport=35506 dport=25 pattern: 1 dst 7.3.142.91 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656401011.917361305 NORDC_MX400_1 flows src=138.130.205.111 dst=7.3.142.91 protocol=tcp sport=35506 dport=25 pattern: 1 dst 7.3.142.91",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 35506,
"protocol": 6,
"streamName": "meraki",
"clientIP": "138.130.205.111",
"serverIP": "7.3.142.91"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656401011.917361305 NORDC_MX400_1 flows src=138.130.205.111 dst=7.3.142.91 protocol=tcp sport=35506 dport=25 pattern: 1 dst 7.3.142.91 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.917361305 NORDC_MX400_1 flows src=138.130.205.111 dst=7.3.142.91 protocol=tcp sport=35506 dport=25 pattern: 1 dst 7.3.142.91 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 35506
protocol: 6
streamName: meraki
clientIP: 138.130.205.111
serverIP: 7.3.142.91 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.917361305 NORDC_MX400_1 flows src=100.21.65.28 dst=138.43.157.207 protocol=tcp sport=35506 dport=25 pattern: 1 dst 138.43.157.207 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656401011.917361305 NORDC_MX400_1 flows src=100.21.65.28 dst=138.43.157.207 protocol=tcp sport=35506 dport=25 pattern: 1 dst 138.43.157.207",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 35506,
"protocol": 6,
"streamName": "meraki",
"clientIP": "100.21.65.28",
"serverIP": "138.43.157.207"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656401011.917361305 NORDC_MX400_1 flows src=100.21.65.28 dst=138.43.157.207 protocol=tcp sport=35506 dport=25 pattern: 1 dst 138.43.157.207 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.917361305 NORDC_MX400_1 flows src=100.21.65.28 dst=138.43.157.207 protocol=tcp sport=35506 dport=25 pattern: 1 dst 138.43.157.207 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 35506
protocol: 6
streamName: meraki
clientIP: 100.21.65.28
serverIP: 138.43.157.207 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.929884222 NORDC_MX400_1 flows src=125.71.123.224 dst=61.81.238.156 protocol=tcp sport=44833 dport=25 pattern: 1 dst 61.81.238.156 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656401011.929884222 NORDC_MX400_1 flows src=125.71.123.224 dst=61.81.238.156 protocol=tcp sport=44833 dport=25 pattern: 1 dst 61.81.238.156",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 44833,
"protocol": 6,
"streamName": "meraki",
"clientIP": "125.71.123.224",
"serverIP": "61.81.238.156"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656401011.929884222 NORDC_MX400_1 flows src=125.71.123.224 dst=61.81.238.156 protocol=tcp sport=44833 dport=25 pattern: 1 dst 61.81.238.156 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.929884222 NORDC_MX400_1 flows src=125.71.123.224 dst=61.81.238.156 protocol=tcp sport=44833 dport=25 pattern: 1 dst 61.81.238.156 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 44833
protocol: 6
streamName: meraki
clientIP: 125.71.123.224
serverIP: 61.81.238.156 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.929884222 NORDC_MX400_1 flows src=155.72.92.132 dst=0.107.182.248 protocol=tcp sport=44833 dport=25 pattern: 1 dst 0.107.182.248 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656401011.929884222 NORDC_MX400_1 flows src=155.72.92.132 dst=0.107.182.248 protocol=tcp sport=44833 dport=25 pattern: 1 dst 0.107.182.248",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 44833,
"protocol": 6,
"streamName": "meraki",
"clientIP": "155.72.92.132",
"serverIP": "0.107.182.248"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656401011.929884222 NORDC_MX400_1 flows src=155.72.92.132 dst=0.107.182.248 protocol=tcp sport=44833 dport=25 pattern: 1 dst 0.107.182.248 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656401011.929884222 NORDC_MX400_1 flows src=155.72.92.132 dst=0.107.182.248 protocol=tcp sport=44833 dport=25 pattern: 1 dst 0.107.182.248 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 44833
protocol: 6
streamName: meraki
clientIP: 155.72.92.132
serverIP: 0.107.182.248 | Explain this syslog message |
<134>Original Address=216.74.188.143 1 1677979368.303670350 M34_MX67C_Atlanta flows src=74.196.213.149 dst=216.74.188.143 protocol=tcp sport=47620 dport=10578 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 10578,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=216.74.188.143 1 1677979368.303670350 M34_MX67C_Atlanta flows src=74.196.213.149 dst=216.74.188.143 protocol=tcp sport=47620 dport=10578 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 47620,
"protocol": 6,
"streamName": "meraki",
"clientIP": "74.196.213.149",
"serverIP": "216.74.188.143"
} | Create a JSON artifact from the message |
<134>Original Address=216.74.188.143 1 1677979368.303670350 M34_MX67C_Atlanta flows src=74.196.213.149 dst=216.74.188.143 protocol=tcp sport=47620 dport=10578 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=216.74.188.143 1 1677979368.303670350 M34_MX67C_Atlanta flows src=74.196.213.149 dst=216.74.188.143 protocol=tcp sport=47620 dport=10578 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 10578
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 47620
protocol: 6
streamName: meraki
clientIP: 74.196.213.149
serverIP: 216.74.188.143 | Explain this syslog message |
<134>Original Address=194.228.131.153 1 1677979368.303670350 M34_MX67C_Atlanta flows src=37.66.247.88 dst=194.228.131.153 protocol=tcp sport=47620 dport=10578 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 10578,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=194.228.131.153 1 1677979368.303670350 M34_MX67C_Atlanta flows src=37.66.247.88 dst=194.228.131.153 protocol=tcp sport=47620 dport=10578 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 47620,
"protocol": 6,
"streamName": "meraki",
"clientIP": "37.66.247.88",
"serverIP": "194.228.131.153"
} | Create a JSON artifact from the message |
<134>Original Address=194.228.131.153 1 1677979368.303670350 M34_MX67C_Atlanta flows src=37.66.247.88 dst=194.228.131.153 protocol=tcp sport=47620 dport=10578 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=194.228.131.153 1 1677979368.303670350 M34_MX67C_Atlanta flows src=37.66.247.88 dst=194.228.131.153 protocol=tcp sport=47620 dport=10578 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 10578
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 47620
protocol: 6
streamName: meraki
clientIP: 37.66.247.88
serverIP: 194.228.131.153 | Explain this syslog message |