input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<134>Original Address=17.203.112.79 1 1677979368.303670350 M34_MX67C_Atlanta flows src=38.110.149.213 dst=17.203.112.79 protocol=tcp sport=47620 dport=10578 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 10578,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=17.203.112.79 1 1677979368.303670350 M34_MX67C_Atlanta flows src=38.110.149.213 dst=17.203.112.79 protocol=tcp sport=47620 dport=10578 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 47620,
"protocol": 6,
"streamName": "meraki",
"clientIP": "38.110.149.213",
"serverIP": "17.203.112.79"
} | Create a JSON artifact from the message |
<134>Original Address=17.203.112.79 1 1677979368.303670350 M34_MX67C_Atlanta flows src=38.110.149.213 dst=17.203.112.79 protocol=tcp sport=47620 dport=10578 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=17.203.112.79 1 1677979368.303670350 M34_MX67C_Atlanta flows src=38.110.149.213 dst=17.203.112.79 protocol=tcp sport=47620 dport=10578 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 10578
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 47620
protocol: 6
streamName: meraki
clientIP: 38.110.149.213
serverIP: 17.203.112.79 | Explain this syslog message |
<134>Original Address=70.230.135.241 1 1677979368.303670350 M34_MX67C_Atlanta flows src=228.129.231.182 dst=70.230.135.241 protocol=tcp sport=47620 dport=10578 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 10578,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=70.230.135.241 1 1677979368.303670350 M34_MX67C_Atlanta flows src=228.129.231.182 dst=70.230.135.241 protocol=tcp sport=47620 dport=10578 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 47620,
"protocol": 6,
"streamName": "meraki",
"clientIP": "228.129.231.182",
"serverIP": "70.230.135.241"
} | Create a JSON artifact from the message |
<134>Original Address=70.230.135.241 1 1677979368.303670350 M34_MX67C_Atlanta flows src=228.129.231.182 dst=70.230.135.241 protocol=tcp sport=47620 dport=10578 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=70.230.135.241 1 1677979368.303670350 M34_MX67C_Atlanta flows src=228.129.231.182 dst=70.230.135.241 protocol=tcp sport=47620 dport=10578 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 10578
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 47620
protocol: 6
streamName: meraki
clientIP: 228.129.231.182
serverIP: 70.230.135.241 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660587751.849988395 NORDC_MX400_1 flows src=54.62.61.239 dst=149.232.221.153 protocol=tcp sport=20800 dport=25 pattern: 1 dst 149.232.221.153 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660587751.849988395 NORDC_MX400_1 flows src=54.62.61.239 dst=149.232.221.153 protocol=tcp sport=20800 dport=25 pattern: 1 dst 149.232.221.153",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 20800,
"protocol": 6,
"streamName": "meraki",
"clientIP": "54.62.61.239",
"serverIP": "149.232.221.153"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660587751.849988395 NORDC_MX400_1 flows src=54.62.61.239 dst=149.232.221.153 protocol=tcp sport=20800 dport=25 pattern: 1 dst 149.232.221.153 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660587751.849988395 NORDC_MX400_1 flows src=54.62.61.239 dst=149.232.221.153 protocol=tcp sport=20800 dport=25 pattern: 1 dst 149.232.221.153 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 20800
protocol: 6
streamName: meraki
clientIP: 54.62.61.239
serverIP: 149.232.221.153 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660587751.849988395 NORDC_MX400_1 flows src=126.205.218.254 dst=187.198.144.77 protocol=tcp sport=20800 dport=25 pattern: 1 dst 187.198.144.77 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660587751.849988395 NORDC_MX400_1 flows src=126.205.218.254 dst=187.198.144.77 protocol=tcp sport=20800 dport=25 pattern: 1 dst 187.198.144.77",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 20800,
"protocol": 6,
"streamName": "meraki",
"clientIP": "126.205.218.254",
"serverIP": "187.198.144.77"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660587751.849988395 NORDC_MX400_1 flows src=126.205.218.254 dst=187.198.144.77 protocol=tcp sport=20800 dport=25 pattern: 1 dst 187.198.144.77 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660587751.849988395 NORDC_MX400_1 flows src=126.205.218.254 dst=187.198.144.77 protocol=tcp sport=20800 dport=25 pattern: 1 dst 187.198.144.77 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 20800
protocol: 6
streamName: meraki
clientIP: 126.205.218.254
serverIP: 187.198.144.77 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660587751.849988395 NORDC_MX400_1 flows src=163.19.205.30 dst=189.192.130.88 protocol=tcp sport=20800 dport=25 pattern: 1 dst 189.192.130.88 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660587751.849988395 NORDC_MX400_1 flows src=163.19.205.30 dst=189.192.130.88 protocol=tcp sport=20800 dport=25 pattern: 1 dst 189.192.130.88",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 20800,
"protocol": 6,
"streamName": "meraki",
"clientIP": "163.19.205.30",
"serverIP": "189.192.130.88"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660587751.849988395 NORDC_MX400_1 flows src=163.19.205.30 dst=189.192.130.88 protocol=tcp sport=20800 dport=25 pattern: 1 dst 189.192.130.88 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660587751.849988395 NORDC_MX400_1 flows src=163.19.205.30 dst=189.192.130.88 protocol=tcp sport=20800 dport=25 pattern: 1 dst 189.192.130.88 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 20800
protocol: 6
streamName: meraki
clientIP: 163.19.205.30
serverIP: 189.192.130.88 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660587751.849988395 NORDC_MX400_1 flows src=147.236.158.123 dst=76.186.176.230 protocol=tcp sport=20800 dport=25 pattern: 1 dst 76.186.176.230 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660587751.849988395 NORDC_MX400_1 flows src=147.236.158.123 dst=76.186.176.230 protocol=tcp sport=20800 dport=25 pattern: 1 dst 76.186.176.230",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 20800,
"protocol": 6,
"streamName": "meraki",
"clientIP": "147.236.158.123",
"serverIP": "76.186.176.230"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660587751.849988395 NORDC_MX400_1 flows src=147.236.158.123 dst=76.186.176.230 protocol=tcp sport=20800 dport=25 pattern: 1 dst 76.186.176.230 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660587751.849988395 NORDC_MX400_1 flows src=147.236.158.123 dst=76.186.176.230 protocol=tcp sport=20800 dport=25 pattern: 1 dst 76.186.176.230 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 20800
protocol: 6
streamName: meraki
clientIP: 147.236.158.123
serverIP: 76.186.176.230 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660587752.409330657 NORDC_MX400_1 flows src=245.141.190.85 dst=145.128.214.99 protocol=tcp sport=53217 dport=25 pattern: 1 dst 145.128.214.99 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660587752.409330657 NORDC_MX400_1 flows src=245.141.190.85 dst=145.128.214.99 protocol=tcp sport=53217 dport=25 pattern: 1 dst 145.128.214.99",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 53217,
"protocol": 6,
"streamName": "meraki",
"clientIP": "245.141.190.85",
"serverIP": "145.128.214.99"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660587752.409330657 NORDC_MX400_1 flows src=245.141.190.85 dst=145.128.214.99 protocol=tcp sport=53217 dport=25 pattern: 1 dst 145.128.214.99 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660587752.409330657 NORDC_MX400_1 flows src=245.141.190.85 dst=145.128.214.99 protocol=tcp sport=53217 dport=25 pattern: 1 dst 145.128.214.99 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 53217
protocol: 6
streamName: meraki
clientIP: 245.141.190.85
serverIP: 145.128.214.99 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660587752.409330657 NORDC_MX400_1 flows src=127.92.193.246 dst=102.11.76.223 protocol=tcp sport=53217 dport=25 pattern: 1 dst 102.11.76.223 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660587752.409330657 NORDC_MX400_1 flows src=127.92.193.246 dst=102.11.76.223 protocol=tcp sport=53217 dport=25 pattern: 1 dst 102.11.76.223",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 53217,
"protocol": 6,
"streamName": "meraki",
"clientIP": "127.92.193.246",
"serverIP": "102.11.76.223"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660587752.409330657 NORDC_MX400_1 flows src=127.92.193.246 dst=102.11.76.223 protocol=tcp sport=53217 dport=25 pattern: 1 dst 102.11.76.223 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660587752.409330657 NORDC_MX400_1 flows src=127.92.193.246 dst=102.11.76.223 protocol=tcp sport=53217 dport=25 pattern: 1 dst 102.11.76.223 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 53217
protocol: 6
streamName: meraki
clientIP: 127.92.193.246
serverIP: 102.11.76.223 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660587752.415068891 NORDC_MX400_1 flows src=63.27.180.246 dst=254.109.145.159 protocol=tcp sport=60128 dport=25 pattern: 1 dst 254.109.145.159 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660587752.415068891 NORDC_MX400_1 flows src=63.27.180.246 dst=254.109.145.159 protocol=tcp sport=60128 dport=25 pattern: 1 dst 254.109.145.159",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 60128,
"protocol": 6,
"streamName": "meraki",
"clientIP": "63.27.180.246",
"serverIP": "254.109.145.159"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660587752.415068891 NORDC_MX400_1 flows src=63.27.180.246 dst=254.109.145.159 protocol=tcp sport=60128 dport=25 pattern: 1 dst 254.109.145.159 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660587752.415068891 NORDC_MX400_1 flows src=63.27.180.246 dst=254.109.145.159 protocol=tcp sport=60128 dport=25 pattern: 1 dst 254.109.145.159 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 60128
protocol: 6
streamName: meraki
clientIP: 63.27.180.246
serverIP: 254.109.145.159 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660587752.415068891 NORDC_MX400_1 flows src=185.152.180.36 dst=45.227.113.190 protocol=tcp sport=60128 dport=25 pattern: 1 dst 45.227.113.190 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660587752.415068891 NORDC_MX400_1 flows src=185.152.180.36 dst=45.227.113.190 protocol=tcp sport=60128 dport=25 pattern: 1 dst 45.227.113.190",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 60128,
"protocol": 6,
"streamName": "meraki",
"clientIP": "185.152.180.36",
"serverIP": "45.227.113.190"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660587752.415068891 NORDC_MX400_1 flows src=185.152.180.36 dst=45.227.113.190 protocol=tcp sport=60128 dport=25 pattern: 1 dst 45.227.113.190 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660587752.415068891 NORDC_MX400_1 flows src=185.152.180.36 dst=45.227.113.190 protocol=tcp sport=60128 dport=25 pattern: 1 dst 45.227.113.190 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 60128
protocol: 6
streamName: meraki
clientIP: 185.152.180.36
serverIP: 45.227.113.190 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660587751.486735130 NORDC_MX400_1 flows src=232.41.84.249 dst=114.242.99.89 protocol=tcp sport=24225 dport=25 pattern: 1 dst 114.242.99.89 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660587751.486735130 NORDC_MX400_1 flows src=232.41.84.249 dst=114.242.99.89 protocol=tcp sport=24225 dport=25 pattern: 1 dst 114.242.99.89",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 24225,
"protocol": 6,
"streamName": "meraki",
"clientIP": "232.41.84.249",
"serverIP": "114.242.99.89"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660587751.486735130 NORDC_MX400_1 flows src=232.41.84.249 dst=114.242.99.89 protocol=tcp sport=24225 dport=25 pattern: 1 dst 114.242.99.89 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660587751.486735130 NORDC_MX400_1 flows src=232.41.84.249 dst=114.242.99.89 protocol=tcp sport=24225 dport=25 pattern: 1 dst 114.242.99.89 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 24225
protocol: 6
streamName: meraki
clientIP: 232.41.84.249
serverIP: 114.242.99.89 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660587751.486735130 NORDC_MX400_1 flows src=65.3.47.192 dst=40.253.182.180 protocol=tcp sport=24225 dport=25 pattern: 1 dst 40.253.182.180 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660587751.486735130 NORDC_MX400_1 flows src=65.3.47.192 dst=40.253.182.180 protocol=tcp sport=24225 dport=25 pattern: 1 dst 40.253.182.180",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 24225,
"protocol": 6,
"streamName": "meraki",
"clientIP": "65.3.47.192",
"serverIP": "40.253.182.180"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660587751.486735130 NORDC_MX400_1 flows src=65.3.47.192 dst=40.253.182.180 protocol=tcp sport=24225 dport=25 pattern: 1 dst 40.253.182.180 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660587751.486735130 NORDC_MX400_1 flows src=65.3.47.192 dst=40.253.182.180 protocol=tcp sport=24225 dport=25 pattern: 1 dst 40.253.182.180 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 24225
protocol: 6
streamName: meraki
clientIP: 65.3.47.192
serverIP: 40.253.182.180 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660587752.420439797 NORDC_MX400_1 flows src=10.118.116.171 dst=70.236.20.97 protocol=tcp sport=6290 dport=25 pattern: 1 dst 70.236.20.97 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660587752.420439797 NORDC_MX400_1 flows src=10.118.116.171 dst=70.236.20.97 protocol=tcp sport=6290 dport=25 pattern: 1 dst 70.236.20.97",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6290,
"protocol": 6,
"streamName": "meraki",
"clientIP": "10.118.116.171",
"serverIP": "70.236.20.97"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660587752.420439797 NORDC_MX400_1 flows src=10.118.116.171 dst=70.236.20.97 protocol=tcp sport=6290 dport=25 pattern: 1 dst 70.236.20.97 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660587752.420439797 NORDC_MX400_1 flows src=10.118.116.171 dst=70.236.20.97 protocol=tcp sport=6290 dport=25 pattern: 1 dst 70.236.20.97 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6290
protocol: 6
streamName: meraki
clientIP: 10.118.116.171
serverIP: 70.236.20.97 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660587752.420439797 NORDC_MX400_1 flows src=229.191.213.29 dst=117.24.38.45 protocol=tcp sport=6290 dport=25 pattern: 1 dst 117.24.38.45 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660587752.420439797 NORDC_MX400_1 flows src=229.191.213.29 dst=117.24.38.45 protocol=tcp sport=6290 dport=25 pattern: 1 dst 117.24.38.45",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6290,
"protocol": 6,
"streamName": "meraki",
"clientIP": "229.191.213.29",
"serverIP": "117.24.38.45"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660587752.420439797 NORDC_MX400_1 flows src=229.191.213.29 dst=117.24.38.45 protocol=tcp sport=6290 dport=25 pattern: 1 dst 117.24.38.45 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660587752.420439797 NORDC_MX400_1 flows src=229.191.213.29 dst=117.24.38.45 protocol=tcp sport=6290 dport=25 pattern: 1 dst 117.24.38.45 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6290
protocol: 6
streamName: meraki
clientIP: 229.191.213.29
serverIP: 117.24.38.45 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660587751.848324940 NORDC_MX400_1 flows src=17.19.22.4 dst=209.118.223.57 protocol=tcp sport=27172 dport=25 pattern: 1 dst 209.118.223.57 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660587751.848324940 NORDC_MX400_1 flows src=17.19.22.4 dst=209.118.223.57 protocol=tcp sport=27172 dport=25 pattern: 1 dst 209.118.223.57",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 27172,
"protocol": 6,
"streamName": "meraki",
"clientIP": "17.19.22.4",
"serverIP": "209.118.223.57"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660587751.848324940 NORDC_MX400_1 flows src=17.19.22.4 dst=209.118.223.57 protocol=tcp sport=27172 dport=25 pattern: 1 dst 209.118.223.57 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660587751.848324940 NORDC_MX400_1 flows src=17.19.22.4 dst=209.118.223.57 protocol=tcp sport=27172 dport=25 pattern: 1 dst 209.118.223.57 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 27172
protocol: 6
streamName: meraki
clientIP: 17.19.22.4
serverIP: 209.118.223.57 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660587751.848324940 NORDC_MX400_1 flows src=85.131.148.114 dst=118.180.16.82 protocol=tcp sport=27172 dport=25 pattern: 1 dst 118.180.16.82 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660587751.848324940 NORDC_MX400_1 flows src=85.131.148.114 dst=118.180.16.82 protocol=tcp sport=27172 dport=25 pattern: 1 dst 118.180.16.82",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 27172,
"protocol": 6,
"streamName": "meraki",
"clientIP": "85.131.148.114",
"serverIP": "118.180.16.82"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660587751.848324940 NORDC_MX400_1 flows src=85.131.148.114 dst=118.180.16.82 protocol=tcp sport=27172 dport=25 pattern: 1 dst 118.180.16.82 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660587751.848324940 NORDC_MX400_1 flows src=85.131.148.114 dst=118.180.16.82 protocol=tcp sport=27172 dport=25 pattern: 1 dst 118.180.16.82 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 27172
protocol: 6
streamName: meraki
clientIP: 85.131.148.114
serverIP: 118.180.16.82 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660587751.852327085 NORDC_MX400_1 flows src=134.116.1.234 dst=228.98.248.97 protocol=tcp sport=36955 dport=25 pattern: 1 dst 228.98.248.97 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660587751.852327085 NORDC_MX400_1 flows src=134.116.1.234 dst=228.98.248.97 protocol=tcp sport=36955 dport=25 pattern: 1 dst 228.98.248.97",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 36955,
"protocol": 6,
"streamName": "meraki",
"clientIP": "134.116.1.234",
"serverIP": "228.98.248.97"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660587751.852327085 NORDC_MX400_1 flows src=134.116.1.234 dst=228.98.248.97 protocol=tcp sport=36955 dport=25 pattern: 1 dst 228.98.248.97 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660587751.852327085 NORDC_MX400_1 flows src=134.116.1.234 dst=228.98.248.97 protocol=tcp sport=36955 dport=25 pattern: 1 dst 228.98.248.97 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 36955
protocol: 6
streamName: meraki
clientIP: 134.116.1.234
serverIP: 228.98.248.97 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660587751.852327085 NORDC_MX400_1 flows src=52.8.140.63 dst=224.29.147.208 protocol=tcp sport=36955 dport=25 pattern: 1 dst 224.29.147.208 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660587751.852327085 NORDC_MX400_1 flows src=52.8.140.63 dst=224.29.147.208 protocol=tcp sport=36955 dport=25 pattern: 1 dst 224.29.147.208",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 36955,
"protocol": 6,
"streamName": "meraki",
"clientIP": "52.8.140.63",
"serverIP": "224.29.147.208"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660587751.852327085 NORDC_MX400_1 flows src=52.8.140.63 dst=224.29.147.208 protocol=tcp sport=36955 dport=25 pattern: 1 dst 224.29.147.208 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660587751.852327085 NORDC_MX400_1 flows src=52.8.140.63 dst=224.29.147.208 protocol=tcp sport=36955 dport=25 pattern: 1 dst 224.29.147.208 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 36955
protocol: 6
streamName: meraki
clientIP: 52.8.140.63
serverIP: 224.29.147.208 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660587751.870029554 NORDC_MX400_1 flows src=143.95.226.173 dst=93.7.125.62 protocol=tcp sport=6540 dport=25 pattern: 1 dst 93.7.125.62 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660587751.870029554 NORDC_MX400_1 flows src=143.95.226.173 dst=93.7.125.62 protocol=tcp sport=6540 dport=25 pattern: 1 dst 93.7.125.62",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6540,
"protocol": 6,
"streamName": "meraki",
"clientIP": "143.95.226.173",
"serverIP": "93.7.125.62"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660587751.870029554 NORDC_MX400_1 flows src=143.95.226.173 dst=93.7.125.62 protocol=tcp sport=6540 dport=25 pattern: 1 dst 93.7.125.62 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660587751.870029554 NORDC_MX400_1 flows src=143.95.226.173 dst=93.7.125.62 protocol=tcp sport=6540 dport=25 pattern: 1 dst 93.7.125.62 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6540
protocol: 6
streamName: meraki
clientIP: 143.95.226.173
serverIP: 93.7.125.62 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660587751.870029554 NORDC_MX400_1 flows src=243.17.190.170 dst=104.239.252.148 protocol=tcp sport=6540 dport=25 pattern: 1 dst 104.239.252.148 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660587751.870029554 NORDC_MX400_1 flows src=243.17.190.170 dst=104.239.252.148 protocol=tcp sport=6540 dport=25 pattern: 1 dst 104.239.252.148",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6540,
"protocol": 6,
"streamName": "meraki",
"clientIP": "243.17.190.170",
"serverIP": "104.239.252.148"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660587751.870029554 NORDC_MX400_1 flows src=243.17.190.170 dst=104.239.252.148 protocol=tcp sport=6540 dport=25 pattern: 1 dst 104.239.252.148 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660587751.870029554 NORDC_MX400_1 flows src=243.17.190.170 dst=104.239.252.148 protocol=tcp sport=6540 dport=25 pattern: 1 dst 104.239.252.148 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6540
protocol: 6
streamName: meraki
clientIP: 243.17.190.170
serverIP: 104.239.252.148 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1662424881.344958206 M52_MX67C_Loxley flows src=32.80.62.153 dst=18.225.9.88 protocol=tcp sport=35290 dport=8080 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 8080,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1662424881.344958206 M52_MX67C_Loxley flows src=32.80.62.153 dst=18.225.9.88 protocol=tcp sport=35290 dport=8080 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 35290,
"protocol": 6,
"streamName": "meraki",
"clientIP": "32.80.62.153",
"serverIP": "18.225.9.88"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1662424881.344958206 M52_MX67C_Loxley flows src=32.80.62.153 dst=18.225.9.88 protocol=tcp sport=35290 dport=8080 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1662424881.344958206 M52_MX67C_Loxley flows src=32.80.62.153 dst=18.225.9.88 protocol=tcp sport=35290 dport=8080 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 8080
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 35290
protocol: 6
streamName: meraki
clientIP: 32.80.62.153
serverIP: 18.225.9.88 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1662424881.344958206 M52_MX67C_Loxley flows src=57.182.37.37 dst=250.121.104.10 protocol=tcp sport=35290 dport=8080 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 8080,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1662424881.344958206 M52_MX67C_Loxley flows src=57.182.37.37 dst=250.121.104.10 protocol=tcp sport=35290 dport=8080 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 35290,
"protocol": 6,
"streamName": "meraki",
"clientIP": "57.182.37.37",
"serverIP": "250.121.104.10"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1662424881.344958206 M52_MX67C_Loxley flows src=57.182.37.37 dst=250.121.104.10 protocol=tcp sport=35290 dport=8080 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1662424881.344958206 M52_MX67C_Loxley flows src=57.182.37.37 dst=250.121.104.10 protocol=tcp sport=35290 dport=8080 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 8080
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 35290
protocol: 6
streamName: meraki
clientIP: 57.182.37.37
serverIP: 250.121.104.10 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1662424881.344958206 M52_MX67C_Loxley flows src=213.36.8.102 dst=228.144.31.85 protocol=tcp sport=35290 dport=8080 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 8080,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1662424881.344958206 M52_MX67C_Loxley flows src=213.36.8.102 dst=228.144.31.85 protocol=tcp sport=35290 dport=8080 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 35290,
"protocol": 6,
"streamName": "meraki",
"clientIP": "213.36.8.102",
"serverIP": "228.144.31.85"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1662424881.344958206 M52_MX67C_Loxley flows src=213.36.8.102 dst=228.144.31.85 protocol=tcp sport=35290 dport=8080 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1662424881.344958206 M52_MX67C_Loxley flows src=213.36.8.102 dst=228.144.31.85 protocol=tcp sport=35290 dport=8080 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 8080
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 35290
protocol: 6
streamName: meraki
clientIP: 213.36.8.102
serverIP: 228.144.31.85 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1662424881.344958206 M52_MX67C_Loxley flows src=241.57.245.55 dst=176.43.176.229 protocol=tcp sport=35290 dport=8080 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 8080,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1662424881.344958206 M52_MX67C_Loxley flows src=241.57.245.55 dst=176.43.176.229 protocol=tcp sport=35290 dport=8080 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 35290,
"protocol": 6,
"streamName": "meraki",
"clientIP": "241.57.245.55",
"serverIP": "176.43.176.229"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1662424881.344958206 M52_MX67C_Loxley flows src=241.57.245.55 dst=176.43.176.229 protocol=tcp sport=35290 dport=8080 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1662424881.344958206 M52_MX67C_Loxley flows src=241.57.245.55 dst=176.43.176.229 protocol=tcp sport=35290 dport=8080 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 8080
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 35290
protocol: 6
streamName: meraki
clientIP: 241.57.245.55
serverIP: 176.43.176.229 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1662424879.870570126 M52_MX67C_Loxley flows src=22.224.7.37 dst=18.224.82.8 protocol=tcp sport=4816 dport=2323 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 2323,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1662424879.870570126 M52_MX67C_Loxley flows src=22.224.7.37 dst=18.224.82.8 protocol=tcp sport=4816 dport=2323 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 4816,
"protocol": 6,
"streamName": "meraki",
"clientIP": "22.224.7.37",
"serverIP": "18.224.82.8"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1662424879.870570126 M52_MX67C_Loxley flows src=22.224.7.37 dst=18.224.82.8 protocol=tcp sport=4816 dport=2323 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1662424879.870570126 M52_MX67C_Loxley flows src=22.224.7.37 dst=18.224.82.8 protocol=tcp sport=4816 dport=2323 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 2323
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 4816
protocol: 6
streamName: meraki
clientIP: 22.224.7.37
serverIP: 18.224.82.8 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1662424879.870570126 M52_MX67C_Loxley flows src=205.145.92.246 dst=232.103.53.36 protocol=tcp sport=4816 dport=2323 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 2323,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1662424879.870570126 M52_MX67C_Loxley flows src=205.145.92.246 dst=232.103.53.36 protocol=tcp sport=4816 dport=2323 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 4816,
"protocol": 6,
"streamName": "meraki",
"clientIP": "205.145.92.246",
"serverIP": "232.103.53.36"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1662424879.870570126 M52_MX67C_Loxley flows src=205.145.92.246 dst=232.103.53.36 protocol=tcp sport=4816 dport=2323 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1662424879.870570126 M52_MX67C_Loxley flows src=205.145.92.246 dst=232.103.53.36 protocol=tcp sport=4816 dport=2323 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 2323
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 4816
protocol: 6
streamName: meraki
clientIP: 205.145.92.246
serverIP: 232.103.53.36 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1662424879.870570126 M52_MX67C_Loxley flows src=227.169.43.54 dst=225.145.84.20 protocol=tcp sport=4816 dport=2323 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 2323,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1662424879.870570126 M52_MX67C_Loxley flows src=227.169.43.54 dst=225.145.84.20 protocol=tcp sport=4816 dport=2323 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 4816,
"protocol": 6,
"streamName": "meraki",
"clientIP": "227.169.43.54",
"serverIP": "225.145.84.20"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1662424879.870570126 M52_MX67C_Loxley flows src=227.169.43.54 dst=225.145.84.20 protocol=tcp sport=4816 dport=2323 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1662424879.870570126 M52_MX67C_Loxley flows src=227.169.43.54 dst=225.145.84.20 protocol=tcp sport=4816 dport=2323 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 2323
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 4816
protocol: 6
streamName: meraki
clientIP: 227.169.43.54
serverIP: 225.145.84.20 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1662424879.870570126 M52_MX67C_Loxley flows src=34.244.27.109 dst=154.58.69.193 protocol=tcp sport=4816 dport=2323 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 2323,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1662424879.870570126 M52_MX67C_Loxley flows src=34.244.27.109 dst=154.58.69.193 protocol=tcp sport=4816 dport=2323 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 4816,
"protocol": 6,
"streamName": "meraki",
"clientIP": "34.244.27.109",
"serverIP": "154.58.69.193"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1662424879.870570126 M52_MX67C_Loxley flows src=34.244.27.109 dst=154.58.69.193 protocol=tcp sport=4816 dport=2323 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1662424879.870570126 M52_MX67C_Loxley flows src=34.244.27.109 dst=154.58.69.193 protocol=tcp sport=4816 dport=2323 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 2323
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 4816
protocol: 6
streamName: meraki
clientIP: 34.244.27.109
serverIP: 154.58.69.193 | Explain this syslog message |
<134>Original Address=12.248.241.178 1 1662424848.839062148 M49_MX67C_Montgomery flows src=166.188.205.199 dst=87.75.83.129 protocol=tcp sport=11487 dport=20029 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 11487,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=12.248.241.178 1 1662424848.839062148 M49_MX67C_Montgomery flows src=166.188.205.199 dst=87.75.83.129 protocol=tcp sport=11487 dport=20029 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 20029,
"protocol": 6,
"streamName": "meraki",
"clientIP": "87.75.83.129",
"serverIP": "166.188.205.199"
} | Create a JSON artifact from the message |
<134>Original Address=12.248.241.178 1 1662424848.839062148 M49_MX67C_Montgomery flows src=166.188.205.199 dst=87.75.83.129 protocol=tcp sport=11487 dport=20029 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=12.248.241.178 1 1662424848.839062148 M49_MX67C_Montgomery flows src=166.188.205.199 dst=87.75.83.129 protocol=tcp sport=11487 dport=20029 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 11487
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 20029
protocol: 6
streamName: meraki
clientIP: 87.75.83.129
serverIP: 166.188.205.199 | Explain this syslog message |
<134>Original Address=12.248.241.178 1 1662424848.839062148 M49_MX67C_Montgomery flows src=203.72.214.32 dst=5.58.102.79 protocol=tcp sport=11487 dport=20029 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 11487,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=12.248.241.178 1 1662424848.839062148 M49_MX67C_Montgomery flows src=203.72.214.32 dst=5.58.102.79 protocol=tcp sport=11487 dport=20029 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 20029,
"protocol": 6,
"streamName": "meraki",
"clientIP": "5.58.102.79",
"serverIP": "203.72.214.32"
} | Create a JSON artifact from the message |
<134>Original Address=12.248.241.178 1 1662424848.839062148 M49_MX67C_Montgomery flows src=203.72.214.32 dst=5.58.102.79 protocol=tcp sport=11487 dport=20029 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=12.248.241.178 1 1662424848.839062148 M49_MX67C_Montgomery flows src=203.72.214.32 dst=5.58.102.79 protocol=tcp sport=11487 dport=20029 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 11487
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 20029
protocol: 6
streamName: meraki
clientIP: 5.58.102.79
serverIP: 203.72.214.32 | Explain this syslog message |
<134>Original Address=12.248.241.178 1 1662424848.839062148 M49_MX67C_Montgomery flows src=138.32.169.28 dst=128.134.75.154 protocol=tcp sport=11487 dport=20029 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 11487,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=12.248.241.178 1 1662424848.839062148 M49_MX67C_Montgomery flows src=138.32.169.28 dst=128.134.75.154 protocol=tcp sport=11487 dport=20029 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 20029,
"protocol": 6,
"streamName": "meraki",
"clientIP": "128.134.75.154",
"serverIP": "138.32.169.28"
} | Create a JSON artifact from the message |
<134>Original Address=12.248.241.178 1 1662424848.839062148 M49_MX67C_Montgomery flows src=138.32.169.28 dst=128.134.75.154 protocol=tcp sport=11487 dport=20029 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=12.248.241.178 1 1662424848.839062148 M49_MX67C_Montgomery flows src=138.32.169.28 dst=128.134.75.154 protocol=tcp sport=11487 dport=20029 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 11487
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 20029
protocol: 6
streamName: meraki
clientIP: 128.134.75.154
serverIP: 138.32.169.28 | Explain this syslog message |
<134>Original Address=12.248.241.178 1 1662424848.839062148 M49_MX67C_Montgomery flows src=240.70.55.42 dst=105.87.180.6 protocol=tcp sport=11487 dport=20029 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 11487,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=12.248.241.178 1 1662424848.839062148 M49_MX67C_Montgomery flows src=240.70.55.42 dst=105.87.180.6 protocol=tcp sport=11487 dport=20029 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 20029,
"protocol": 6,
"streamName": "meraki",
"clientIP": "105.87.180.6",
"serverIP": "240.70.55.42"
} | Create a JSON artifact from the message |
<134>Original Address=12.248.241.178 1 1662424848.839062148 M49_MX67C_Montgomery flows src=240.70.55.42 dst=105.87.180.6 protocol=tcp sport=11487 dport=20029 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=12.248.241.178 1 1662424848.839062148 M49_MX67C_Montgomery flows src=240.70.55.42 dst=105.87.180.6 protocol=tcp sport=11487 dport=20029 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 11487
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 20029
protocol: 6
streamName: meraki
clientIP: 105.87.180.6
serverIP: 240.70.55.42 | Explain this syslog message |
<134>Original Address=12.248.241.178 1 1662424867.769386668 M49_MX67C_Montgomery flows src=240.223.230.8 dst=254.87.90.158 protocol=tcp sport=57120 dport=4400 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 4400,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=12.248.241.178 1 1662424867.769386668 M49_MX67C_Montgomery flows src=240.223.230.8 dst=254.87.90.158 protocol=tcp sport=57120 dport=4400 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 57120,
"protocol": 6,
"streamName": "meraki",
"clientIP": "240.223.230.8",
"serverIP": "254.87.90.158"
} | Create a JSON artifact from the message |
<134>Original Address=12.248.241.178 1 1662424867.769386668 M49_MX67C_Montgomery flows src=240.223.230.8 dst=254.87.90.158 protocol=tcp sport=57120 dport=4400 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=12.248.241.178 1 1662424867.769386668 M49_MX67C_Montgomery flows src=240.223.230.8 dst=254.87.90.158 protocol=tcp sport=57120 dport=4400 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 4400
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 57120
protocol: 6
streamName: meraki
clientIP: 240.223.230.8
serverIP: 254.87.90.158 | Explain this syslog message |
<134>Original Address=12.248.241.178 1 1662424867.769386668 M49_MX67C_Montgomery flows src=209.121.148.222 dst=119.38.17.46 protocol=tcp sport=57120 dport=4400 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 4400,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=12.248.241.178 1 1662424867.769386668 M49_MX67C_Montgomery flows src=209.121.148.222 dst=119.38.17.46 protocol=tcp sport=57120 dport=4400 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 57120,
"protocol": 6,
"streamName": "meraki",
"clientIP": "209.121.148.222",
"serverIP": "119.38.17.46"
} | Create a JSON artifact from the message |