input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<134>Original Address=243.141.148.129 1 1656855219.215958603 M52_MX67C_Loxley flows src=64.204.32.69 dst=243.141.148.129 protocol=tcp sport=443 dport=49837 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=243.141.148.129 1 1656855219.215958603 M52_MX67C_Loxley flows src=64.204.32.69 dst=243.141.148.129 protocol=tcp sport=443 dport=49837 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 443
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 49837
protocol: 6
streamName: meraki
clientIP: 243.141.148.129
serverIP: 64.204.32.69 | Explain this syslog message |
<134>Original Address=10.11.22.1 1 1656855186.197721654 M22_MX67C_Marietta flows src=41.18.250.203 dst=116.64.170.107 protocol=udp sport=6003 dport=35751 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 6003,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=10.11.22.1 1 1656855186.197721654 M22_MX67C_Marietta flows src=41.18.250.203 dst=116.64.170.107 protocol=udp sport=6003 dport=35751 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 35751,
"protocol": 17,
"streamName": "meraki",
"clientIP": "116.64.170.107",
"serverIP": "41.18.250.203"
} | Create a JSON artifact from the message |
<134>Original Address=10.11.22.1 1 1656855186.197721654 M22_MX67C_Marietta flows src=41.18.250.203 dst=116.64.170.107 protocol=udp sport=6003 dport=35751 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=10.11.22.1 1 1656855186.197721654 M22_MX67C_Marietta flows src=41.18.250.203 dst=116.64.170.107 protocol=udp sport=6003 dport=35751 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 6003
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 35751
protocol: 17
streamName: meraki
clientIP: 116.64.170.107
serverIP: 41.18.250.203 | Explain this syslog message |
<134>Original Address=10.11.22.1 1 1656855186.197721654 M22_MX67C_Marietta flows src=22.217.165.98 dst=174.190.78.132 protocol=udp sport=6003 dport=35751 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 6003,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=10.11.22.1 1 1656855186.197721654 M22_MX67C_Marietta flows src=22.217.165.98 dst=174.190.78.132 protocol=udp sport=6003 dport=35751 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 35751,
"protocol": 17,
"streamName": "meraki",
"clientIP": "174.190.78.132",
"serverIP": "22.217.165.98"
} | Create a JSON artifact from the message |
<134>Original Address=10.11.22.1 1 1656855186.197721654 M22_MX67C_Marietta flows src=22.217.165.98 dst=174.190.78.132 protocol=udp sport=6003 dport=35751 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=10.11.22.1 1 1656855186.197721654 M22_MX67C_Marietta flows src=22.217.165.98 dst=174.190.78.132 protocol=udp sport=6003 dport=35751 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 6003
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 35751
protocol: 17
streamName: meraki
clientIP: 174.190.78.132
serverIP: 22.217.165.98 | Explain this syslog message |
<134>Original Address=10.11.22.1 1 1656855186.197721654 M22_MX67C_Marietta flows src=246.241.174.42 dst=213.189.9.126 protocol=udp sport=6003 dport=35751 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 6003,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=10.11.22.1 1 1656855186.197721654 M22_MX67C_Marietta flows src=246.241.174.42 dst=213.189.9.126 protocol=udp sport=6003 dport=35751 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 35751,
"protocol": 17,
"streamName": "meraki",
"clientIP": "213.189.9.126",
"serverIP": "246.241.174.42"
} | Create a JSON artifact from the message |
<134>Original Address=10.11.22.1 1 1656855186.197721654 M22_MX67C_Marietta flows src=246.241.174.42 dst=213.189.9.126 protocol=udp sport=6003 dport=35751 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=10.11.22.1 1 1656855186.197721654 M22_MX67C_Marietta flows src=246.241.174.42 dst=213.189.9.126 protocol=udp sport=6003 dport=35751 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 6003
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 35751
protocol: 17
streamName: meraki
clientIP: 213.189.9.126
serverIP: 246.241.174.42 | Explain this syslog message |
<134>Original Address=10.11.22.1 1 1656855186.197721654 M22_MX67C_Marietta flows src=92.223.177.67 dst=105.91.245.22 protocol=udp sport=6003 dport=35751 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 6003,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=10.11.22.1 1 1656855186.197721654 M22_MX67C_Marietta flows src=92.223.177.67 dst=105.91.245.22 protocol=udp sport=6003 dport=35751 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 35751,
"protocol": 17,
"streamName": "meraki",
"clientIP": "105.91.245.22",
"serverIP": "92.223.177.67"
} | Create a JSON artifact from the message |
<134>Original Address=10.11.22.1 1 1656855186.197721654 M22_MX67C_Marietta flows src=92.223.177.67 dst=105.91.245.22 protocol=udp sport=6003 dport=35751 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=10.11.22.1 1 1656855186.197721654 M22_MX67C_Marietta flows src=92.223.177.67 dst=105.91.245.22 protocol=udp sport=6003 dport=35751 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 6003
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 35751
protocol: 17
streamName: meraki
clientIP: 105.91.245.22
serverIP: 92.223.177.67 | Explain this syslog message |
<134>Original Address=10.11.22.1 1 1656855220.068790854 M22_MX67C_Marietta flows src=125.140.176.94 dst=98.251.67.156 protocol=tcp sport=42035 dport=9211 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9211,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=10.11.22.1 1 1656855220.068790854 M22_MX67C_Marietta flows src=125.140.176.94 dst=98.251.67.156 protocol=tcp sport=42035 dport=9211 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 42035,
"protocol": 6,
"streamName": "meraki",
"clientIP": "125.140.176.94",
"serverIP": "98.251.67.156"
} | Create a JSON artifact from the message |
<134>Original Address=10.11.22.1 1 1656855220.068790854 M22_MX67C_Marietta flows src=125.140.176.94 dst=98.251.67.156 protocol=tcp sport=42035 dport=9211 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=10.11.22.1 1 1656855220.068790854 M22_MX67C_Marietta flows src=125.140.176.94 dst=98.251.67.156 protocol=tcp sport=42035 dport=9211 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9211
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 42035
protocol: 6
streamName: meraki
clientIP: 125.140.176.94
serverIP: 98.251.67.156 | Explain this syslog message |
<134>Original Address=10.11.22.1 1 1656855220.068790854 M22_MX67C_Marietta flows src=78.165.174.69 dst=96.114.223.43 protocol=tcp sport=42035 dport=9211 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9211,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=10.11.22.1 1 1656855220.068790854 M22_MX67C_Marietta flows src=78.165.174.69 dst=96.114.223.43 protocol=tcp sport=42035 dport=9211 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 42035,
"protocol": 6,
"streamName": "meraki",
"clientIP": "78.165.174.69",
"serverIP": "96.114.223.43"
} | Create a JSON artifact from the message |
<134>Original Address=10.11.22.1 1 1656855220.068790854 M22_MX67C_Marietta flows src=78.165.174.69 dst=96.114.223.43 protocol=tcp sport=42035 dport=9211 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=10.11.22.1 1 1656855220.068790854 M22_MX67C_Marietta flows src=78.165.174.69 dst=96.114.223.43 protocol=tcp sport=42035 dport=9211 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9211
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 42035
protocol: 6
streamName: meraki
clientIP: 78.165.174.69
serverIP: 96.114.223.43 | Explain this syslog message |
<134>Original Address=10.11.22.1 1 1656855220.068790854 M22_MX67C_Marietta flows src=61.159.247.170 dst=45.227.20.84 protocol=tcp sport=42035 dport=9211 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9211,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=10.11.22.1 1 1656855220.068790854 M22_MX67C_Marietta flows src=61.159.247.170 dst=45.227.20.84 protocol=tcp sport=42035 dport=9211 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 42035,
"protocol": 6,
"streamName": "meraki",
"clientIP": "61.159.247.170",
"serverIP": "45.227.20.84"
} | Create a JSON artifact from the message |
<134>Original Address=10.11.22.1 1 1656855220.068790854 M22_MX67C_Marietta flows src=61.159.247.170 dst=45.227.20.84 protocol=tcp sport=42035 dport=9211 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=10.11.22.1 1 1656855220.068790854 M22_MX67C_Marietta flows src=61.159.247.170 dst=45.227.20.84 protocol=tcp sport=42035 dport=9211 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9211
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 42035
protocol: 6
streamName: meraki
clientIP: 61.159.247.170
serverIP: 45.227.20.84 | Explain this syslog message |
<134>Original Address=10.11.22.1 1 1656855220.068790854 M22_MX67C_Marietta flows src=50.91.129.244 dst=242.240.122.142 protocol=tcp sport=42035 dport=9211 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9211,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=10.11.22.1 1 1656855220.068790854 M22_MX67C_Marietta flows src=50.91.129.244 dst=242.240.122.142 protocol=tcp sport=42035 dport=9211 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 42035,
"protocol": 6,
"streamName": "meraki",
"clientIP": "50.91.129.244",
"serverIP": "242.240.122.142"
} | Create a JSON artifact from the message |
<134>Original Address=10.11.22.1 1 1656855220.068790854 M22_MX67C_Marietta flows src=50.91.129.244 dst=242.240.122.142 protocol=tcp sport=42035 dport=9211 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=10.11.22.1 1 1656855220.068790854 M22_MX67C_Marietta flows src=50.91.129.244 dst=242.240.122.142 protocol=tcp sport=42035 dport=9211 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9211
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 42035
protocol: 6
streamName: meraki
clientIP: 50.91.129.244
serverIP: 242.240.122.142 | Explain this syslog message |
<134>Original Address=95.86.27.63 1 1656854906.609637923 M52_MX67C_Loxley flows src=221.29.240.116 dst=95.86.27.63 protocol=udp sport=61862 dport=61490 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 61490,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=95.86.27.63 1 1656854906.609637923 M52_MX67C_Loxley flows src=221.29.240.116 dst=95.86.27.63 protocol=udp sport=61862 dport=61490 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 61862,
"protocol": 17,
"streamName": "meraki",
"clientIP": "221.29.240.116",
"serverIP": "95.86.27.63"
} | Create a JSON artifact from the message |
<134>Original Address=95.86.27.63 1 1656854906.609637923 M52_MX67C_Loxley flows src=221.29.240.116 dst=95.86.27.63 protocol=udp sport=61862 dport=61490 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=95.86.27.63 1 1656854906.609637923 M52_MX67C_Loxley flows src=221.29.240.116 dst=95.86.27.63 protocol=udp sport=61862 dport=61490 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 61490
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 61862
protocol: 17
streamName: meraki
clientIP: 221.29.240.116
serverIP: 95.86.27.63 | Explain this syslog message |
<134>Original Address=175.152.117.26 1 1656854906.609637923 M52_MX67C_Loxley flows src=102.4.196.247 dst=175.152.117.26 protocol=udp sport=61862 dport=61490 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 61490,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=175.152.117.26 1 1656854906.609637923 M52_MX67C_Loxley flows src=102.4.196.247 dst=175.152.117.26 protocol=udp sport=61862 dport=61490 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 61862,
"protocol": 17,
"streamName": "meraki",
"clientIP": "102.4.196.247",
"serverIP": "175.152.117.26"
} | Create a JSON artifact from the message |
<134>Original Address=175.152.117.26 1 1656854906.609637923 M52_MX67C_Loxley flows src=102.4.196.247 dst=175.152.117.26 protocol=udp sport=61862 dport=61490 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=175.152.117.26 1 1656854906.609637923 M52_MX67C_Loxley flows src=102.4.196.247 dst=175.152.117.26 protocol=udp sport=61862 dport=61490 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 61490
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 61862
protocol: 17
streamName: meraki
clientIP: 102.4.196.247
serverIP: 175.152.117.26 | Explain this syslog message |
<134>Original Address=112.240.166.110 1 1656854906.609637923 M52_MX67C_Loxley flows src=35.10.186.233 dst=112.240.166.110 protocol=udp sport=61862 dport=61490 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 61490,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=112.240.166.110 1 1656854906.609637923 M52_MX67C_Loxley flows src=35.10.186.233 dst=112.240.166.110 protocol=udp sport=61862 dport=61490 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 61862,
"protocol": 17,
"streamName": "meraki",
"clientIP": "35.10.186.233",
"serverIP": "112.240.166.110"
} | Create a JSON artifact from the message |
<134>Original Address=112.240.166.110 1 1656854906.609637923 M52_MX67C_Loxley flows src=35.10.186.233 dst=112.240.166.110 protocol=udp sport=61862 dport=61490 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=112.240.166.110 1 1656854906.609637923 M52_MX67C_Loxley flows src=35.10.186.233 dst=112.240.166.110 protocol=udp sport=61862 dport=61490 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 61490
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 61862
protocol: 17
streamName: meraki
clientIP: 35.10.186.233
serverIP: 112.240.166.110 | Explain this syslog message |
<134>Original Address=165.111.121.211 1 1656854906.609637923 M52_MX67C_Loxley flows src=209.69.182.57 dst=165.111.121.211 protocol=udp sport=61862 dport=61490 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 61490,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=165.111.121.211 1 1656854906.609637923 M52_MX67C_Loxley flows src=209.69.182.57 dst=165.111.121.211 protocol=udp sport=61862 dport=61490 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 61862,
"protocol": 17,
"streamName": "meraki",
"clientIP": "209.69.182.57",
"serverIP": "165.111.121.211"
} | Create a JSON artifact from the message |
<134>Original Address=165.111.121.211 1 1656854906.609637923 M52_MX67C_Loxley flows src=209.69.182.57 dst=165.111.121.211 protocol=udp sport=61862 dport=61490 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=165.111.121.211 1 1656854906.609637923 M52_MX67C_Loxley flows src=209.69.182.57 dst=165.111.121.211 protocol=udp sport=61862 dport=61490 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 61490
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 61862
protocol: 17
streamName: meraki
clientIP: 209.69.182.57
serverIP: 165.111.121.211 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1656854908.869224643 M52_MX67C_Loxley flows src=97.208.122.251 dst=44.64.188.249 protocol=tcp sport=64930 dport=7680 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 7680,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1656854908.869224643 M52_MX67C_Loxley flows src=97.208.122.251 dst=44.64.188.249 protocol=tcp sport=64930 dport=7680 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 64930,
"protocol": 6,
"streamName": "meraki",
"clientIP": "97.208.122.251",
"serverIP": "44.64.188.249"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1656854908.869224643 M52_MX67C_Loxley flows src=97.208.122.251 dst=44.64.188.249 protocol=tcp sport=64930 dport=7680 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1656854908.869224643 M52_MX67C_Loxley flows src=97.208.122.251 dst=44.64.188.249 protocol=tcp sport=64930 dport=7680 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 7680
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 64930
protocol: 6
streamName: meraki
clientIP: 97.208.122.251
serverIP: 44.64.188.249 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1656854908.869224643 M52_MX67C_Loxley flows src=92.50.246.4 dst=126.237.70.168 protocol=tcp sport=64930 dport=7680 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 7680,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1656854908.869224643 M52_MX67C_Loxley flows src=92.50.246.4 dst=126.237.70.168 protocol=tcp sport=64930 dport=7680 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 64930,
"protocol": 6,
"streamName": "meraki",
"clientIP": "92.50.246.4",
"serverIP": "126.237.70.168"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1656854908.869224643 M52_MX67C_Loxley flows src=92.50.246.4 dst=126.237.70.168 protocol=tcp sport=64930 dport=7680 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1656854908.869224643 M52_MX67C_Loxley flows src=92.50.246.4 dst=126.237.70.168 protocol=tcp sport=64930 dport=7680 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 7680
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 64930
protocol: 6
streamName: meraki
clientIP: 92.50.246.4
serverIP: 126.237.70.168 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1656854908.869224643 M52_MX67C_Loxley flows src=131.58.166.6 dst=214.209.133.200 protocol=tcp sport=64930 dport=7680 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 7680,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1656854908.869224643 M52_MX67C_Loxley flows src=131.58.166.6 dst=214.209.133.200 protocol=tcp sport=64930 dport=7680 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 64930,
"protocol": 6,
"streamName": "meraki",
"clientIP": "131.58.166.6",
"serverIP": "214.209.133.200"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1656854908.869224643 M52_MX67C_Loxley flows src=131.58.166.6 dst=214.209.133.200 protocol=tcp sport=64930 dport=7680 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1656854908.869224643 M52_MX67C_Loxley flows src=131.58.166.6 dst=214.209.133.200 protocol=tcp sport=64930 dport=7680 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 7680
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 64930
protocol: 6
streamName: meraki
clientIP: 131.58.166.6
serverIP: 214.209.133.200 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1656854908.869224643 M52_MX67C_Loxley flows src=98.111.170.222 dst=252.217.83.166 protocol=tcp sport=64930 dport=7680 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 7680,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1656854908.869224643 M52_MX67C_Loxley flows src=98.111.170.222 dst=252.217.83.166 protocol=tcp sport=64930 dport=7680 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 64930,
"protocol": 6,
"streamName": "meraki",
"clientIP": "98.111.170.222",
"serverIP": "252.217.83.166"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1656854908.869224643 M52_MX67C_Loxley flows src=98.111.170.222 dst=252.217.83.166 protocol=tcp sport=64930 dport=7680 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1656854908.869224643 M52_MX67C_Loxley flows src=98.111.170.222 dst=252.217.83.166 protocol=tcp sport=64930 dport=7680 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 7680
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 64930
protocol: 6
streamName: meraki
clientIP: 98.111.170.222
serverIP: 252.217.83.166 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1656855189.780447923 M52_MX67C_Loxley flows src=220.90.2.56 dst=12.107.133.219 protocol=tcp sport=52114 dport=49902 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 49902,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1656855189.780447923 M52_MX67C_Loxley flows src=220.90.2.56 dst=12.107.133.219 protocol=tcp sport=52114 dport=49902 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 52114,
"protocol": 6,
"streamName": "meraki",
"clientIP": "220.90.2.56",
"serverIP": "12.107.133.219"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1656855189.780447923 M52_MX67C_Loxley flows src=220.90.2.56 dst=12.107.133.219 protocol=tcp sport=52114 dport=49902 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1656855189.780447923 M52_MX67C_Loxley flows src=220.90.2.56 dst=12.107.133.219 protocol=tcp sport=52114 dport=49902 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 49902
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 52114
protocol: 6
streamName: meraki
clientIP: 220.90.2.56
serverIP: 12.107.133.219 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1656855189.780447923 M52_MX67C_Loxley flows src=78.199.94.122 dst=207.135.79.97 protocol=tcp sport=52114 dport=49902 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 49902,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1656855189.780447923 M52_MX67C_Loxley flows src=78.199.94.122 dst=207.135.79.97 protocol=tcp sport=52114 dport=49902 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 52114,
"protocol": 6,
"streamName": "meraki",
"clientIP": "78.199.94.122",
"serverIP": "207.135.79.97"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1656855189.780447923 M52_MX67C_Loxley flows src=78.199.94.122 dst=207.135.79.97 protocol=tcp sport=52114 dport=49902 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1656855189.780447923 M52_MX67C_Loxley flows src=78.199.94.122 dst=207.135.79.97 protocol=tcp sport=52114 dport=49902 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 49902
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 52114
protocol: 6
streamName: meraki
clientIP: 78.199.94.122
serverIP: 207.135.79.97 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1656855189.780447923 M52_MX67C_Loxley flows src=201.86.5.175 dst=248.134.57.209 protocol=tcp sport=52114 dport=49902 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 49902,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1656855189.780447923 M52_MX67C_Loxley flows src=201.86.5.175 dst=248.134.57.209 protocol=tcp sport=52114 dport=49902 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 52114,
"protocol": 6,
"streamName": "meraki",
"clientIP": "201.86.5.175",
"serverIP": "248.134.57.209"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1656855189.780447923 M52_MX67C_Loxley flows src=201.86.5.175 dst=248.134.57.209 protocol=tcp sport=52114 dport=49902 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1656855189.780447923 M52_MX67C_Loxley flows src=201.86.5.175 dst=248.134.57.209 protocol=tcp sport=52114 dport=49902 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 49902
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 52114
protocol: 6
streamName: meraki
clientIP: 201.86.5.175
serverIP: 248.134.57.209 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1656855189.780447923 M52_MX67C_Loxley flows src=236.204.36.194 dst=93.222.156.177 protocol=tcp sport=52114 dport=49902 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 49902,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1656855189.780447923 M52_MX67C_Loxley flows src=236.204.36.194 dst=93.222.156.177 protocol=tcp sport=52114 dport=49902 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 52114,
"protocol": 6,
"streamName": "meraki",
"clientIP": "236.204.36.194",
"serverIP": "93.222.156.177"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1656855189.780447923 M52_MX67C_Loxley flows src=236.204.36.194 dst=93.222.156.177 protocol=tcp sport=52114 dport=49902 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1656855189.780447923 M52_MX67C_Loxley flows src=236.204.36.194 dst=93.222.156.177 protocol=tcp sport=52114 dport=49902 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 49902
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 52114
protocol: 6
streamName: meraki
clientIP: 236.204.36.194
serverIP: 93.222.156.177 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1656855208.580714843 M52_MX67C_Loxley flows src=71.176.30.21 dst=175.100.159.195 protocol=tcp sport=55002 dport=4200 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 4200,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1656855208.580714843 M52_MX67C_Loxley flows src=71.176.30.21 dst=175.100.159.195 protocol=tcp sport=55002 dport=4200 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 55002,
"protocol": 6,
"streamName": "meraki",
"clientIP": "71.176.30.21",
"serverIP": "175.100.159.195"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1656855208.580714843 M52_MX67C_Loxley flows src=71.176.30.21 dst=175.100.159.195 protocol=tcp sport=55002 dport=4200 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1656855208.580714843 M52_MX67C_Loxley flows src=71.176.30.21 dst=175.100.159.195 protocol=tcp sport=55002 dport=4200 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 4200
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 55002
protocol: 6
streamName: meraki
clientIP: 71.176.30.21
serverIP: 175.100.159.195 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1656855208.580714843 M52_MX67C_Loxley flows src=239.166.54.64 dst=0.11.5.94 protocol=tcp sport=55002 dport=4200 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 4200,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1656855208.580714843 M52_MX67C_Loxley flows src=239.166.54.64 dst=0.11.5.94 protocol=tcp sport=55002 dport=4200 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 55002,
"protocol": 6,
"streamName": "meraki",
"clientIP": "239.166.54.64",
"serverIP": "0.11.5.94"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1656855208.580714843 M52_MX67C_Loxley flows src=239.166.54.64 dst=0.11.5.94 protocol=tcp sport=55002 dport=4200 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1656855208.580714843 M52_MX67C_Loxley flows src=239.166.54.64 dst=0.11.5.94 protocol=tcp sport=55002 dport=4200 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 4200
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 55002
protocol: 6
streamName: meraki
clientIP: 239.166.54.64
serverIP: 0.11.5.94 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1656855208.580714843 M52_MX67C_Loxley flows src=214.34.34.209 dst=83.13.153.227 protocol=tcp sport=55002 dport=4200 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 4200,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1656855208.580714843 M52_MX67C_Loxley flows src=214.34.34.209 dst=83.13.153.227 protocol=tcp sport=55002 dport=4200 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 55002,
"protocol": 6,
"streamName": "meraki",
"clientIP": "214.34.34.209",
"serverIP": "83.13.153.227"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1656855208.580714843 M52_MX67C_Loxley flows src=214.34.34.209 dst=83.13.153.227 protocol=tcp sport=55002 dport=4200 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1656855208.580714843 M52_MX67C_Loxley flows src=214.34.34.209 dst=83.13.153.227 protocol=tcp sport=55002 dport=4200 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 4200
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 55002
protocol: 6
streamName: meraki
clientIP: 214.34.34.209
serverIP: 83.13.153.227 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1656855208.580714843 M52_MX67C_Loxley flows src=39.180.12.75 dst=96.215.44.76 protocol=tcp sport=55002 dport=4200 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 4200,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1656855208.580714843 M52_MX67C_Loxley flows src=39.180.12.75 dst=96.215.44.76 protocol=tcp sport=55002 dport=4200 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 55002,
"protocol": 6,
"streamName": "meraki",
"clientIP": "39.180.12.75",
"serverIP": "96.215.44.76"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1656855208.580714843 M52_MX67C_Loxley flows src=39.180.12.75 dst=96.215.44.76 protocol=tcp sport=55002 dport=4200 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1656855208.580714843 M52_MX67C_Loxley flows src=39.180.12.75 dst=96.215.44.76 protocol=tcp sport=55002 dport=4200 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 4200
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 55002
protocol: 6
streamName: meraki
clientIP: 39.180.12.75
serverIP: 96.215.44.76 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1656855237.962883643 M52_MX67C_Loxley flows src=188.112.139.123 dst=150.226.254.239 protocol=tcp sport=55067 dport=7680 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 7680,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1656855237.962883643 M52_MX67C_Loxley flows src=188.112.139.123 dst=150.226.254.239 protocol=tcp sport=55067 dport=7680 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 55067,
"protocol": 6,
"streamName": "meraki",
"clientIP": "188.112.139.123",
"serverIP": "150.226.254.239"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1656855237.962883643 M52_MX67C_Loxley flows src=188.112.139.123 dst=150.226.254.239 protocol=tcp sport=55067 dport=7680 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1656855237.962883643 M52_MX67C_Loxley flows src=188.112.139.123 dst=150.226.254.239 protocol=tcp sport=55067 dport=7680 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 7680
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 55067
protocol: 6
streamName: meraki
clientIP: 188.112.139.123
serverIP: 150.226.254.239 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1656855237.962883643 M52_MX67C_Loxley flows src=173.176.215.7 dst=145.49.62.25 protocol=tcp sport=55067 dport=7680 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 7680,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1656855237.962883643 M52_MX67C_Loxley flows src=173.176.215.7 dst=145.49.62.25 protocol=tcp sport=55067 dport=7680 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 55067,
"protocol": 6,
"streamName": "meraki",
"clientIP": "173.176.215.7",
"serverIP": "145.49.62.25"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1656855237.962883643 M52_MX67C_Loxley flows src=173.176.215.7 dst=145.49.62.25 protocol=tcp sport=55067 dport=7680 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1656855237.962883643 M52_MX67C_Loxley flows src=173.176.215.7 dst=145.49.62.25 protocol=tcp sport=55067 dport=7680 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 7680
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 55067
protocol: 6
streamName: meraki
clientIP: 173.176.215.7
serverIP: 145.49.62.25 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1656855237.962883643 M52_MX67C_Loxley flows src=0.61.37.176 dst=126.86.89.137 protocol=tcp sport=55067 dport=7680 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 7680,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1656855237.962883643 M52_MX67C_Loxley flows src=0.61.37.176 dst=126.86.89.137 protocol=tcp sport=55067 dport=7680 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 55067,
"protocol": 6,
"streamName": "meraki",
"clientIP": "0.61.37.176",
"serverIP": "126.86.89.137"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1656855237.962883643 M52_MX67C_Loxley flows src=0.61.37.176 dst=126.86.89.137 protocol=tcp sport=55067 dport=7680 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1656855237.962883643 M52_MX67C_Loxley flows src=0.61.37.176 dst=126.86.89.137 protocol=tcp sport=55067 dport=7680 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 7680
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 55067
protocol: 6
streamName: meraki
clientIP: 0.61.37.176
serverIP: 126.86.89.137 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1656855237.962883643 M52_MX67C_Loxley flows src=89.236.206.49 dst=50.76.254.168 protocol=tcp sport=55067 dport=7680 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 7680,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1656855237.962883643 M52_MX67C_Loxley flows src=89.236.206.49 dst=50.76.254.168 protocol=tcp sport=55067 dport=7680 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 55067,
"protocol": 6,
"streamName": "meraki",
"clientIP": "89.236.206.49",
"serverIP": "50.76.254.168"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1656855237.962883643 M52_MX67C_Loxley flows src=89.236.206.49 dst=50.76.254.168 protocol=tcp sport=55067 dport=7680 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1656855237.962883643 M52_MX67C_Loxley flows src=89.236.206.49 dst=50.76.254.168 protocol=tcp sport=55067 dport=7680 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 7680
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 55067
protocol: 6
streamName: meraki
clientIP: 89.236.206.49
serverIP: 50.76.254.168 | Explain this syslog message |
<134>Original Address=10.11.22.1 1 1656854917.458186454 M22_MX67C_Marietta flows src=183.161.134.181 dst=31.54.218.137 protocol=udp sport=5959 dport=59585 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 5959,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=10.11.22.1 1 1656854917.458186454 M22_MX67C_Marietta flows src=183.161.134.181 dst=31.54.218.137 protocol=udp sport=5959 dport=59585 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 59585,
"protocol": 17,
"streamName": "meraki",
"clientIP": "31.54.218.137",
"serverIP": "183.161.134.181"
} | Create a JSON artifact from the message |
<134>Original Address=10.11.22.1 1 1656854917.458186454 M22_MX67C_Marietta flows src=183.161.134.181 dst=31.54.218.137 protocol=udp sport=5959 dport=59585 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=10.11.22.1 1 1656854917.458186454 M22_MX67C_Marietta flows src=183.161.134.181 dst=31.54.218.137 protocol=udp sport=5959 dport=59585 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5959
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 59585
protocol: 17
streamName: meraki
clientIP: 31.54.218.137
serverIP: 183.161.134.181 | Explain this syslog message |
<134>Original Address=10.11.22.1 1 1656854917.458186454 M22_MX67C_Marietta flows src=17.82.124.123 dst=137.248.0.226 protocol=udp sport=5959 dport=59585 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 5959,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=10.11.22.1 1 1656854917.458186454 M22_MX67C_Marietta flows src=17.82.124.123 dst=137.248.0.226 protocol=udp sport=5959 dport=59585 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 59585,
"protocol": 17,
"streamName": "meraki",
"clientIP": "137.248.0.226",
"serverIP": "17.82.124.123"
} | Create a JSON artifact from the message |
<134>Original Address=10.11.22.1 1 1656854917.458186454 M22_MX67C_Marietta flows src=17.82.124.123 dst=137.248.0.226 protocol=udp sport=5959 dport=59585 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=10.11.22.1 1 1656854917.458186454 M22_MX67C_Marietta flows src=17.82.124.123 dst=137.248.0.226 protocol=udp sport=5959 dport=59585 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5959
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 59585
protocol: 17
streamName: meraki
clientIP: 137.248.0.226
serverIP: 17.82.124.123 | Explain this syslog message |
<134>Original Address=10.11.22.1 1 1656854917.458186454 M22_MX67C_Marietta flows src=207.38.182.133 dst=58.125.64.60 protocol=udp sport=5959 dport=59585 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 5959,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=10.11.22.1 1 1656854917.458186454 M22_MX67C_Marietta flows src=207.38.182.133 dst=58.125.64.60 protocol=udp sport=5959 dport=59585 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 59585,
"protocol": 17,
"streamName": "meraki",
"clientIP": "58.125.64.60",
"serverIP": "207.38.182.133"
} | Create a JSON artifact from the message |
<134>Original Address=10.11.22.1 1 1656854917.458186454 M22_MX67C_Marietta flows src=207.38.182.133 dst=58.125.64.60 protocol=udp sport=5959 dport=59585 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=10.11.22.1 1 1656854917.458186454 M22_MX67C_Marietta flows src=207.38.182.133 dst=58.125.64.60 protocol=udp sport=5959 dport=59585 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5959
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 59585
protocol: 17
streamName: meraki
clientIP: 58.125.64.60
serverIP: 207.38.182.133 | Explain this syslog message |
<134>Original Address=10.11.22.1 1 1656854917.458186454 M22_MX67C_Marietta flows src=16.208.2.32 dst=164.71.143.178 protocol=udp sport=5959 dport=59585 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 5959,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=10.11.22.1 1 1656854917.458186454 M22_MX67C_Marietta flows src=16.208.2.32 dst=164.71.143.178 protocol=udp sport=5959 dport=59585 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 59585,
"protocol": 17,
"streamName": "meraki",
"clientIP": "164.71.143.178",
"serverIP": "16.208.2.32"
} | Create a JSON artifact from the message |
<134>Original Address=10.11.22.1 1 1656854917.458186454 M22_MX67C_Marietta flows src=16.208.2.32 dst=164.71.143.178 protocol=udp sport=5959 dport=59585 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=10.11.22.1 1 1656854917.458186454 M22_MX67C_Marietta flows src=16.208.2.32 dst=164.71.143.178 protocol=udp sport=5959 dport=59585 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5959
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 59585
protocol: 17
streamName: meraki
clientIP: 164.71.143.178
serverIP: 16.208.2.32 | Explain this syslog message |
<134>Original Address=211.78.92.171 1 1656855253.383053922 M24_MX67C_ForestPark flows src=19.243.66.50 dst=211.78.92.171 protocol=tcp sport=42035 dport=7913 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 7913,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=211.78.92.171 1 1656855253.383053922 M24_MX67C_ForestPark flows src=19.243.66.50 dst=211.78.92.171 protocol=tcp sport=42035 dport=7913 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 42035,
"protocol": 6,
"streamName": "meraki",
"clientIP": "19.243.66.50",
"serverIP": "211.78.92.171"
} | Create a JSON artifact from the message |
<134>Original Address=211.78.92.171 1 1656855253.383053922 M24_MX67C_ForestPark flows src=19.243.66.50 dst=211.78.92.171 protocol=tcp sport=42035 dport=7913 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
Subsets and Splits