input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<134>Original Address=192.168.2.253 1 1661096830.468415765 NORDC_MX400_1 flows src=153.185.44.105 dst=244.185.55.125 protocol=tcp sport=1889 dport=25 pattern: 1 dst 244.185.55.125
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661096830.468415765 NORDC_MX400_1 flows src=153.185.44.105 dst=244.185.55.125 protocol=tcp sport=1889 dport=25 pattern: 1 dst 244.185.55.125
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 1889 protocol: 6 streamName: meraki clientIP: 153.185.44.105 serverIP: 244.185.55.125
Explain this syslog message
<134>Original Address=192.168.2.253 1 1661096830.141780520 NORDC_MX400_1 flows src=162.77.89.54 dst=73.116.104.39 protocol=tcp sport=6197 dport=25 pattern: 1 dst 73.116.104.39
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1661096830.141780520 NORDC_MX400_1 flows src=162.77.89.54 dst=73.116.104.39 protocol=tcp sport=6197 dport=25 pattern: 1 dst 73.116.104.39", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 6197, "protocol": 6, "streamName": "meraki", "clientIP": "162.77.89.54", "serverIP": "73.116.104.39" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1661096830.141780520 NORDC_MX400_1 flows src=162.77.89.54 dst=73.116.104.39 protocol=tcp sport=6197 dport=25 pattern: 1 dst 73.116.104.39
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661096830.141780520 NORDC_MX400_1 flows src=162.77.89.54 dst=73.116.104.39 protocol=tcp sport=6197 dport=25 pattern: 1 dst 73.116.104.39
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 6197 protocol: 6 streamName: meraki clientIP: 162.77.89.54 serverIP: 73.116.104.39
Explain this syslog message
<134>Original Address=192.168.2.253 1 1661096830.141780520 NORDC_MX400_1 flows src=18.1.212.203 dst=137.170.245.80 protocol=tcp sport=6197 dport=25 pattern: 1 dst 137.170.245.80
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1661096830.141780520 NORDC_MX400_1 flows src=18.1.212.203 dst=137.170.245.80 protocol=tcp sport=6197 dport=25 pattern: 1 dst 137.170.245.80", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 6197, "protocol": 6, "streamName": "meraki", "clientIP": "18.1.212.203", "serverIP": "137.170.245.80" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1661096830.141780520 NORDC_MX400_1 flows src=18.1.212.203 dst=137.170.245.80 protocol=tcp sport=6197 dport=25 pattern: 1 dst 137.170.245.80
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661096830.141780520 NORDC_MX400_1 flows src=18.1.212.203 dst=137.170.245.80 protocol=tcp sport=6197 dport=25 pattern: 1 dst 137.170.245.80
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 6197 protocol: 6 streamName: meraki clientIP: 18.1.212.203 serverIP: 137.170.245.80
Explain this syslog message
<134>Original Address=192.168.2.253 1 1661096830.232683052 NORDC_MX400_1 flows src=24.92.170.155 dst=51.9.176.42 protocol=tcp sport=5572 dport=25 pattern: 1 dst 51.9.176.42
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1661096830.232683052 NORDC_MX400_1 flows src=24.92.170.155 dst=51.9.176.42 protocol=tcp sport=5572 dport=25 pattern: 1 dst 51.9.176.42", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 5572, "protocol": 6, "streamName": "meraki", "clientIP": "24.92.170.155", "serverIP": "51.9.176.42" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1661096830.232683052 NORDC_MX400_1 flows src=24.92.170.155 dst=51.9.176.42 protocol=tcp sport=5572 dport=25 pattern: 1 dst 51.9.176.42
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661096830.232683052 NORDC_MX400_1 flows src=24.92.170.155 dst=51.9.176.42 protocol=tcp sport=5572 dport=25 pattern: 1 dst 51.9.176.42
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 5572 protocol: 6 streamName: meraki clientIP: 24.92.170.155 serverIP: 51.9.176.42
Explain this syslog message
<134>Original Address=192.168.2.253 1 1661096830.232683052 NORDC_MX400_1 flows src=71.137.67.69 dst=55.22.5.48 protocol=tcp sport=5572 dport=25 pattern: 1 dst 55.22.5.48
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1661096830.232683052 NORDC_MX400_1 flows src=71.137.67.69 dst=55.22.5.48 protocol=tcp sport=5572 dport=25 pattern: 1 dst 55.22.5.48", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 5572, "protocol": 6, "streamName": "meraki", "clientIP": "71.137.67.69", "serverIP": "55.22.5.48" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1661096830.232683052 NORDC_MX400_1 flows src=71.137.67.69 dst=55.22.5.48 protocol=tcp sport=5572 dport=25 pattern: 1 dst 55.22.5.48
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661096830.232683052 NORDC_MX400_1 flows src=71.137.67.69 dst=55.22.5.48 protocol=tcp sport=5572 dport=25 pattern: 1 dst 55.22.5.48
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 5572 protocol: 6 streamName: meraki clientIP: 71.137.67.69 serverIP: 55.22.5.48
Explain this syslog message
<134>Original Address=192.168.2.253 1 1661096829.084040385 NORDC_MX400_1 flows src=224.167.60.163 dst=101.94.89.114 protocol=tcp sport=62176 dport=25 pattern: 1 dst 101.94.89.114
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1661096829.084040385 NORDC_MX400_1 flows src=224.167.60.163 dst=101.94.89.114 protocol=tcp sport=62176 dport=25 pattern: 1 dst 101.94.89.114", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 62176, "protocol": 6, "streamName": "meraki", "clientIP": "224.167.60.163", "serverIP": "101.94.89.114" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1661096829.084040385 NORDC_MX400_1 flows src=224.167.60.163 dst=101.94.89.114 protocol=tcp sport=62176 dport=25 pattern: 1 dst 101.94.89.114
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661096829.084040385 NORDC_MX400_1 flows src=224.167.60.163 dst=101.94.89.114 protocol=tcp sport=62176 dport=25 pattern: 1 dst 101.94.89.114
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 62176 protocol: 6 streamName: meraki clientIP: 224.167.60.163 serverIP: 101.94.89.114
Explain this syslog message
<134>Original Address=192.168.2.253 1 1661096829.084040385 NORDC_MX400_1 flows src=248.132.7.166 dst=186.216.79.144 protocol=tcp sport=62176 dport=25 pattern: 1 dst 186.216.79.144
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1661096829.084040385 NORDC_MX400_1 flows src=248.132.7.166 dst=186.216.79.144 protocol=tcp sport=62176 dport=25 pattern: 1 dst 186.216.79.144", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 62176, "protocol": 6, "streamName": "meraki", "clientIP": "248.132.7.166", "serverIP": "186.216.79.144" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1661096829.084040385 NORDC_MX400_1 flows src=248.132.7.166 dst=186.216.79.144 protocol=tcp sport=62176 dport=25 pattern: 1 dst 186.216.79.144
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661096829.084040385 NORDC_MX400_1 flows src=248.132.7.166 dst=186.216.79.144 protocol=tcp sport=62176 dport=25 pattern: 1 dst 186.216.79.144
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 62176 protocol: 6 streamName: meraki clientIP: 248.132.7.166 serverIP: 186.216.79.144
Explain this syslog message
<134>Original Address=192.168.2.253 1 1661096829.519586685 NORDC_MX400_1 flows src=97.226.115.207 dst=46.253.141.194 protocol=tcp sport=54337 dport=25 pattern: 1 dst 46.253.141.194
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1661096829.519586685 NORDC_MX400_1 flows src=97.226.115.207 dst=46.253.141.194 protocol=tcp sport=54337 dport=25 pattern: 1 dst 46.253.141.194", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 54337, "protocol": 6, "streamName": "meraki", "clientIP": "97.226.115.207", "serverIP": "46.253.141.194" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1661096829.519586685 NORDC_MX400_1 flows src=97.226.115.207 dst=46.253.141.194 protocol=tcp sport=54337 dport=25 pattern: 1 dst 46.253.141.194
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661096829.519586685 NORDC_MX400_1 flows src=97.226.115.207 dst=46.253.141.194 protocol=tcp sport=54337 dport=25 pattern: 1 dst 46.253.141.194
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 54337 protocol: 6 streamName: meraki clientIP: 97.226.115.207 serverIP: 46.253.141.194
Explain this syslog message
<134>Original Address=192.168.2.253 1 1661096829.519586685 NORDC_MX400_1 flows src=246.71.120.101 dst=85.132.243.3 protocol=tcp sport=54337 dport=25 pattern: 1 dst 85.132.243.3
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1661096829.519586685 NORDC_MX400_1 flows src=246.71.120.101 dst=85.132.243.3 protocol=tcp sport=54337 dport=25 pattern: 1 dst 85.132.243.3", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 54337, "protocol": 6, "streamName": "meraki", "clientIP": "246.71.120.101", "serverIP": "85.132.243.3" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1661096829.519586685 NORDC_MX400_1 flows src=246.71.120.101 dst=85.132.243.3 protocol=tcp sport=54337 dport=25 pattern: 1 dst 85.132.243.3
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661096829.519586685 NORDC_MX400_1 flows src=246.71.120.101 dst=85.132.243.3 protocol=tcp sport=54337 dport=25 pattern: 1 dst 85.132.243.3
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 54337 protocol: 6 streamName: meraki clientIP: 246.71.120.101 serverIP: 85.132.243.3
Explain this syslog message
<134>Original Address=192.168.2.253 1 1661096829.601296908 NORDC_MX400_1 flows src=84.75.103.34 dst=177.95.168.183 protocol=tcp sport=27808 dport=25 pattern: 1 dst 177.95.168.183
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1661096829.601296908 NORDC_MX400_1 flows src=84.75.103.34 dst=177.95.168.183 protocol=tcp sport=27808 dport=25 pattern: 1 dst 177.95.168.183", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 27808, "protocol": 6, "streamName": "meraki", "clientIP": "84.75.103.34", "serverIP": "177.95.168.183" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1661096829.601296908 NORDC_MX400_1 flows src=84.75.103.34 dst=177.95.168.183 protocol=tcp sport=27808 dport=25 pattern: 1 dst 177.95.168.183
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661096829.601296908 NORDC_MX400_1 flows src=84.75.103.34 dst=177.95.168.183 protocol=tcp sport=27808 dport=25 pattern: 1 dst 177.95.168.183
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 27808 protocol: 6 streamName: meraki clientIP: 84.75.103.34 serverIP: 177.95.168.183
Explain this syslog message
<134>Original Address=192.168.2.253 1 1661096829.601296908 NORDC_MX400_1 flows src=118.140.4.111 dst=245.155.241.75 protocol=tcp sport=27808 dport=25 pattern: 1 dst 245.155.241.75
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1661096829.601296908 NORDC_MX400_1 flows src=118.140.4.111 dst=245.155.241.75 protocol=tcp sport=27808 dport=25 pattern: 1 dst 245.155.241.75", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 27808, "protocol": 6, "streamName": "meraki", "clientIP": "118.140.4.111", "serverIP": "245.155.241.75" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1661096829.601296908 NORDC_MX400_1 flows src=118.140.4.111 dst=245.155.241.75 protocol=tcp sport=27808 dport=25 pattern: 1 dst 245.155.241.75
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661096829.601296908 NORDC_MX400_1 flows src=118.140.4.111 dst=245.155.241.75 protocol=tcp sport=27808 dport=25 pattern: 1 dst 245.155.241.75
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 27808 protocol: 6 streamName: meraki clientIP: 118.140.4.111 serverIP: 245.155.241.75
Explain this syslog message
<134>Original Address=192.168.2.253 1 1661096829.997370779 NORDC_MX400_1 flows src=81.61.132.93 dst=199.120.82.218 protocol=tcp sport=53600 dport=25 pattern: 1 dst 199.120.82.218
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1661096829.997370779 NORDC_MX400_1 flows src=81.61.132.93 dst=199.120.82.218 protocol=tcp sport=53600 dport=25 pattern: 1 dst 199.120.82.218", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 53600, "protocol": 6, "streamName": "meraki", "clientIP": "81.61.132.93", "serverIP": "199.120.82.218" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1661096829.997370779 NORDC_MX400_1 flows src=81.61.132.93 dst=199.120.82.218 protocol=tcp sport=53600 dport=25 pattern: 1 dst 199.120.82.218
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661096829.997370779 NORDC_MX400_1 flows src=81.61.132.93 dst=199.120.82.218 protocol=tcp sport=53600 dport=25 pattern: 1 dst 199.120.82.218
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 53600 protocol: 6 streamName: meraki clientIP: 81.61.132.93 serverIP: 199.120.82.218
Explain this syslog message
<134>Original Address=192.168.2.253 1 1661096829.997370779 NORDC_MX400_1 flows src=206.241.94.91 dst=50.13.162.40 protocol=tcp sport=53600 dport=25 pattern: 1 dst 50.13.162.40
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1661096829.997370779 NORDC_MX400_1 flows src=206.241.94.91 dst=50.13.162.40 protocol=tcp sport=53600 dport=25 pattern: 1 dst 50.13.162.40", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 53600, "protocol": 6, "streamName": "meraki", "clientIP": "206.241.94.91", "serverIP": "50.13.162.40" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1661096829.997370779 NORDC_MX400_1 flows src=206.241.94.91 dst=50.13.162.40 protocol=tcp sport=53600 dport=25 pattern: 1 dst 50.13.162.40
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661096829.997370779 NORDC_MX400_1 flows src=206.241.94.91 dst=50.13.162.40 protocol=tcp sport=53600 dport=25 pattern: 1 dst 50.13.162.40
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 53600 protocol: 6 streamName: meraki clientIP: 206.241.94.91 serverIP: 50.13.162.40
Explain this syslog message
<134>Original Address=192.168.2.253 1 1661096829.879609832 NORDC_MX400_1 flows src=35.236.139.76 dst=51.87.94.126 protocol=tcp sport=40807 dport=25 pattern: 1 dst 51.87.94.126
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1661096829.879609832 NORDC_MX400_1 flows src=35.236.139.76 dst=51.87.94.126 protocol=tcp sport=40807 dport=25 pattern: 1 dst 51.87.94.126", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 40807, "protocol": 6, "streamName": "meraki", "clientIP": "35.236.139.76", "serverIP": "51.87.94.126" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1661096829.879609832 NORDC_MX400_1 flows src=35.236.139.76 dst=51.87.94.126 protocol=tcp sport=40807 dport=25 pattern: 1 dst 51.87.94.126
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661096829.879609832 NORDC_MX400_1 flows src=35.236.139.76 dst=51.87.94.126 protocol=tcp sport=40807 dport=25 pattern: 1 dst 51.87.94.126
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 40807 protocol: 6 streamName: meraki clientIP: 35.236.139.76 serverIP: 51.87.94.126
Explain this syslog message
<134>Original Address=192.168.2.253 1 1661096829.879609832 NORDC_MX400_1 flows src=86.168.176.140 dst=183.215.236.4 protocol=tcp sport=40807 dport=25 pattern: 1 dst 183.215.236.4
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1661096829.879609832 NORDC_MX400_1 flows src=86.168.176.140 dst=183.215.236.4 protocol=tcp sport=40807 dport=25 pattern: 1 dst 183.215.236.4", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 40807, "protocol": 6, "streamName": "meraki", "clientIP": "86.168.176.140", "serverIP": "183.215.236.4" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1661096829.879609832 NORDC_MX400_1 flows src=86.168.176.140 dst=183.215.236.4 protocol=tcp sport=40807 dport=25 pattern: 1 dst 183.215.236.4
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661096829.879609832 NORDC_MX400_1 flows src=86.168.176.140 dst=183.215.236.4 protocol=tcp sport=40807 dport=25 pattern: 1 dst 183.215.236.4
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 40807 protocol: 6 streamName: meraki clientIP: 86.168.176.140 serverIP: 183.215.236.4
Explain this syslog message
<134>Original Address=192.168.2.253 1 1661096830.918310053 NORDC_MX400_1 flows src=212.214.53.89 dst=184.187.184.23 protocol=udp sport=4104 dport=4104 pattern: 1 dst 184.187.184.23
{ "senderhost": "192.168.2.250", "serverport": 4104, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1661096830.918310053 NORDC_MX400_1 flows src=212.214.53.89 dst=184.187.184.23 protocol=udp sport=4104 dport=4104 pattern: 1 dst 184.187.184.23", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 4104, "protocol": 17, "streamName": "meraki", "clientIP": "184.187.184.23", "serverIP": "212.214.53.89" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1661096830.918310053 NORDC_MX400_1 flows src=212.214.53.89 dst=184.187.184.23 protocol=udp sport=4104 dport=4104 pattern: 1 dst 184.187.184.23
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661096830.918310053 NORDC_MX400_1 flows src=212.214.53.89 dst=184.187.184.23 protocol=udp sport=4104 dport=4104 pattern: 1 dst 184.187.184.23
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 4104 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 4104 protocol: 17 streamName: meraki clientIP: 184.187.184.23 serverIP: 212.214.53.89
Explain this syslog message
<134>Original Address=192.168.2.253 1 1661096830.918310053 NORDC_MX400_1 flows src=190.230.220.27 dst=195.202.61.2 protocol=udp sport=4104 dport=4104 pattern: 1 dst 195.202.61.2
{ "senderhost": "192.168.2.250", "serverport": 4104, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1661096830.918310053 NORDC_MX400_1 flows src=190.230.220.27 dst=195.202.61.2 protocol=udp sport=4104 dport=4104 pattern: 1 dst 195.202.61.2", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 4104, "protocol": 17, "streamName": "meraki", "clientIP": "195.202.61.2", "serverIP": "190.230.220.27" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1661096830.918310053 NORDC_MX400_1 flows src=190.230.220.27 dst=195.202.61.2 protocol=udp sport=4104 dport=4104 pattern: 1 dst 195.202.61.2
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661096830.918310053 NORDC_MX400_1 flows src=190.230.220.27 dst=195.202.61.2 protocol=udp sport=4104 dport=4104 pattern: 1 dst 195.202.61.2
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 4104 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 4104 protocol: 17 streamName: meraki clientIP: 195.202.61.2 serverIP: 190.230.220.27
Explain this syslog message
<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=74.60.134.91 dst=161.154.69.196 protocol=tcp sport=27316 dport=25 pattern: 1 dst 161.154.69.196
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=74.60.134.91 dst=161.154.69.196 protocol=tcp sport=27316 dport=25 pattern: 1 dst 161.154.69.196", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 27316, "protocol": 6, "streamName": "meraki", "clientIP": "74.60.134.91", "serverIP": "161.154.69.196" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=74.60.134.91 dst=161.154.69.196 protocol=tcp sport=27316 dport=25 pattern: 1 dst 161.154.69.196
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=74.60.134.91 dst=161.154.69.196 protocol=tcp sport=27316 dport=25 pattern: 1 dst 161.154.69.196
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 27316 protocol: 6 streamName: meraki clientIP: 74.60.134.91 serverIP: 161.154.69.196
Explain this syslog message
<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=226.147.37.130 dst=79.2.49.235 protocol=tcp sport=27316 dport=25 pattern: 1 dst 79.2.49.235
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=226.147.37.130 dst=79.2.49.235 protocol=tcp sport=27316 dport=25 pattern: 1 dst 79.2.49.235", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 27316, "protocol": 6, "streamName": "meraki", "clientIP": "226.147.37.130", "serverIP": "79.2.49.235" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=226.147.37.130 dst=79.2.49.235 protocol=tcp sport=27316 dport=25 pattern: 1 dst 79.2.49.235
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=226.147.37.130 dst=79.2.49.235 protocol=tcp sport=27316 dport=25 pattern: 1 dst 79.2.49.235
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 27316 protocol: 6 streamName: meraki clientIP: 226.147.37.130 serverIP: 79.2.49.235
Explain this syslog message
<134>Original Address=192.168.2.253 1 1657178921.042876082 NORDC_MX400_1 flows src=142.50.36.161 dst=182.32.77.4 protocol=tcp sport=33750 dport=25 pattern: 1 dst 182.32.77.4
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1657178921.042876082 NORDC_MX400_1 flows src=142.50.36.161 dst=182.32.77.4 protocol=tcp sport=33750 dport=25 pattern: 1 dst 182.32.77.4", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 33750, "protocol": 6, "streamName": "meraki", "clientIP": "142.50.36.161", "serverIP": "182.32.77.4" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1657178921.042876082 NORDC_MX400_1 flows src=142.50.36.161 dst=182.32.77.4 protocol=tcp sport=33750 dport=25 pattern: 1 dst 182.32.77.4
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1657178921.042876082 NORDC_MX400_1 flows src=142.50.36.161 dst=182.32.77.4 protocol=tcp sport=33750 dport=25 pattern: 1 dst 182.32.77.4
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 33750 protocol: 6 streamName: meraki clientIP: 142.50.36.161 serverIP: 182.32.77.4
Explain this syslog message
<134>Original Address=192.168.2.253 1 1657178921.042876082 NORDC_MX400_1 flows src=141.159.198.204 dst=236.56.253.106 protocol=tcp sport=33750 dport=25 pattern: 1 dst 236.56.253.106
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1657178921.042876082 NORDC_MX400_1 flows src=141.159.198.204 dst=236.56.253.106 protocol=tcp sport=33750 dport=25 pattern: 1 dst 236.56.253.106", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 33750, "protocol": 6, "streamName": "meraki", "clientIP": "141.159.198.204", "serverIP": "236.56.253.106" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1657178921.042876082 NORDC_MX400_1 flows src=141.159.198.204 dst=236.56.253.106 protocol=tcp sport=33750 dport=25 pattern: 1 dst 236.56.253.106
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1657178921.042876082 NORDC_MX400_1 flows src=141.159.198.204 dst=236.56.253.106 protocol=tcp sport=33750 dport=25 pattern: 1 dst 236.56.253.106
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 33750 protocol: 6 streamName: meraki clientIP: 141.159.198.204 serverIP: 236.56.253.106
Explain this syslog message
<134>Original Address=192.168.2.253 1 1657178921.243297544 NORDC_MX400_1 flows src=220.5.153.113 dst=67.231.138.115 protocol=tcp sport=32993 dport=25 pattern: 1 dst 67.231.138.115
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1657178921.243297544 NORDC_MX400_1 flows src=220.5.153.113 dst=67.231.138.115 protocol=tcp sport=32993 dport=25 pattern: 1 dst 67.231.138.115", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 32993, "protocol": 6, "streamName": "meraki", "clientIP": "220.5.153.113", "serverIP": "67.231.138.115" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1657178921.243297544 NORDC_MX400_1 flows src=220.5.153.113 dst=67.231.138.115 protocol=tcp sport=32993 dport=25 pattern: 1 dst 67.231.138.115
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1657178921.243297544 NORDC_MX400_1 flows src=220.5.153.113 dst=67.231.138.115 protocol=tcp sport=32993 dport=25 pattern: 1 dst 67.231.138.115
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 32993 protocol: 6 streamName: meraki clientIP: 220.5.153.113 serverIP: 67.231.138.115
Explain this syslog message
<134>Original Address=192.168.2.253 1 1657178921.243297544 NORDC_MX400_1 flows src=96.13.45.50 dst=53.201.196.172 protocol=tcp sport=32993 dport=25 pattern: 1 dst 53.201.196.172
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1657178921.243297544 NORDC_MX400_1 flows src=96.13.45.50 dst=53.201.196.172 protocol=tcp sport=32993 dport=25 pattern: 1 dst 53.201.196.172", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 32993, "protocol": 6, "streamName": "meraki", "clientIP": "96.13.45.50", "serverIP": "53.201.196.172" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1657178921.243297544 NORDC_MX400_1 flows src=96.13.45.50 dst=53.201.196.172 protocol=tcp sport=32993 dport=25 pattern: 1 dst 53.201.196.172
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1657178921.243297544 NORDC_MX400_1 flows src=96.13.45.50 dst=53.201.196.172 protocol=tcp sport=32993 dport=25 pattern: 1 dst 53.201.196.172
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 32993 protocol: 6 streamName: meraki clientIP: 96.13.45.50 serverIP: 53.201.196.172
Explain this syslog message
<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=173.152.176.148 dst=56.163.190.40 protocol=tcp sport=27316 dport=25 pattern: 1 dst 56.163.190.40
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=173.152.176.148 dst=56.163.190.40 protocol=tcp sport=27316 dport=25 pattern: 1 dst 56.163.190.40", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 27316, "protocol": 6, "streamName": "meraki", "clientIP": "173.152.176.148", "serverIP": "56.163.190.40" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=173.152.176.148 dst=56.163.190.40 protocol=tcp sport=27316 dport=25 pattern: 1 dst 56.163.190.40
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=173.152.176.148 dst=56.163.190.40 protocol=tcp sport=27316 dport=25 pattern: 1 dst 56.163.190.40
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 27316 protocol: 6 streamName: meraki clientIP: 173.152.176.148 serverIP: 56.163.190.40
Explain this syslog message
<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=232.186.101.247 dst=56.13.184.85 protocol=tcp sport=27316 dport=25 pattern: 1 dst 56.13.184.85
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=232.186.101.247 dst=56.13.184.85 protocol=tcp sport=27316 dport=25 pattern: 1 dst 56.13.184.85", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 27316, "protocol": 6, "streamName": "meraki", "clientIP": "232.186.101.247", "serverIP": "56.13.184.85" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=232.186.101.247 dst=56.13.184.85 protocol=tcp sport=27316 dport=25 pattern: 1 dst 56.13.184.85
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=232.186.101.247 dst=56.13.184.85 protocol=tcp sport=27316 dport=25 pattern: 1 dst 56.13.184.85
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 27316 protocol: 6 streamName: meraki clientIP: 232.186.101.247 serverIP: 56.13.184.85
Explain this syslog message
<134>Original Address=192.168.2.253 1 1657178920.538141736 NORDC_MX400_1 flows src=246.73.147.196 dst=175.149.151.112 protocol=tcp sport=53089 dport=25 pattern: 1 dst 175.149.151.112
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1657178920.538141736 NORDC_MX400_1 flows src=246.73.147.196 dst=175.149.151.112 protocol=tcp sport=53089 dport=25 pattern: 1 dst 175.149.151.112", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 53089, "protocol": 6, "streamName": "meraki", "clientIP": "246.73.147.196", "serverIP": "175.149.151.112" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1657178920.538141736 NORDC_MX400_1 flows src=246.73.147.196 dst=175.149.151.112 protocol=tcp sport=53089 dport=25 pattern: 1 dst 175.149.151.112
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1657178920.538141736 NORDC_MX400_1 flows src=246.73.147.196 dst=175.149.151.112 protocol=tcp sport=53089 dport=25 pattern: 1 dst 175.149.151.112
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 53089 protocol: 6 streamName: meraki clientIP: 246.73.147.196 serverIP: 175.149.151.112
Explain this syslog message
<134>Original Address=192.168.2.253 1 1657178920.538141736 NORDC_MX400_1 flows src=159.146.142.71 dst=17.6.107.205 protocol=tcp sport=53089 dport=25 pattern: 1 dst 17.6.107.205
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1657178920.538141736 NORDC_MX400_1 flows src=159.146.142.71 dst=17.6.107.205 protocol=tcp sport=53089 dport=25 pattern: 1 dst 17.6.107.205", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 53089, "protocol": 6, "streamName": "meraki", "clientIP": "159.146.142.71", "serverIP": "17.6.107.205" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1657178920.538141736 NORDC_MX400_1 flows src=159.146.142.71 dst=17.6.107.205 protocol=tcp sport=53089 dport=25 pattern: 1 dst 17.6.107.205
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1657178920.538141736 NORDC_MX400_1 flows src=159.146.142.71 dst=17.6.107.205 protocol=tcp sport=53089 dport=25 pattern: 1 dst 17.6.107.205
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 53089 protocol: 6 streamName: meraki clientIP: 159.146.142.71 serverIP: 17.6.107.205
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=240.72.198.90 dst=163.26.75.177 protocol=tcp sport=54280 dport=81 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 81, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=240.72.198.90 dst=163.26.75.177 protocol=tcp sport=54280 dport=81 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 54280, "protocol": 6, "streamName": "meraki", "clientIP": "240.72.198.90", "serverIP": "163.26.75.177" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=240.72.198.90 dst=163.26.75.177 protocol=tcp sport=54280 dport=81 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=240.72.198.90 dst=163.26.75.177 protocol=tcp sport=54280 dport=81 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 81 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 54280 protocol: 6 streamName: meraki clientIP: 240.72.198.90 serverIP: 163.26.75.177
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=169.234.225.158 dst=217.189.85.161 protocol=tcp sport=54280 dport=81 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 81, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=169.234.225.158 dst=217.189.85.161 protocol=tcp sport=54280 dport=81 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 54280, "protocol": 6, "streamName": "meraki", "clientIP": "169.234.225.158", "serverIP": "217.189.85.161" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=169.234.225.158 dst=217.189.85.161 protocol=tcp sport=54280 dport=81 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=169.234.225.158 dst=217.189.85.161 protocol=tcp sport=54280 dport=81 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 81 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 54280 protocol: 6 streamName: meraki clientIP: 169.234.225.158 serverIP: 217.189.85.161
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=110.199.160.209 dst=112.249.90.88 protocol=tcp sport=54280 dport=81 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 81, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=110.199.160.209 dst=112.249.90.88 protocol=tcp sport=54280 dport=81 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 54280, "protocol": 6, "streamName": "meraki", "clientIP": "110.199.160.209", "serverIP": "112.249.90.88" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=110.199.160.209 dst=112.249.90.88 protocol=tcp sport=54280 dport=81 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=110.199.160.209 dst=112.249.90.88 protocol=tcp sport=54280 dport=81 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 81 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 54280 protocol: 6 streamName: meraki clientIP: 110.199.160.209 serverIP: 112.249.90.88
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=93.187.129.186 dst=10.44.36.46 protocol=tcp sport=54280 dport=81 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 81, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=93.187.129.186 dst=10.44.36.46 protocol=tcp sport=54280 dport=81 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 54280, "protocol": 6, "streamName": "meraki", "clientIP": "93.187.129.186", "serverIP": "10.44.36.46" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=93.187.129.186 dst=10.44.36.46 protocol=tcp sport=54280 dport=81 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=93.187.129.186 dst=10.44.36.46 protocol=tcp sport=54280 dport=81 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 81 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 54280 protocol: 6 streamName: meraki clientIP: 93.187.129.186 serverIP: 10.44.36.46
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655152365.212890085 NORDC_MX400_1 flows src=101.60.99.48 dst=17.73.33.129 protocol=tcp sport=46288 dport=3817 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 3817, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655152365.212890085 NORDC_MX400_1 flows src=101.60.99.48 dst=17.73.33.129 protocol=tcp sport=46288 dport=3817 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 46288, "protocol": 6, "streamName": "meraki", "clientIP": "101.60.99.48", "serverIP": "17.73.33.129" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655152365.212890085 NORDC_MX400_1 flows src=101.60.99.48 dst=17.73.33.129 protocol=tcp sport=46288 dport=3817 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655152365.212890085 NORDC_MX400_1 flows src=101.60.99.48 dst=17.73.33.129 protocol=tcp sport=46288 dport=3817 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 3817 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 46288 protocol: 6 streamName: meraki clientIP: 101.60.99.48 serverIP: 17.73.33.129
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655152365.212890085 NORDC_MX400_1 flows src=24.156.165.54 dst=131.192.183.255 protocol=tcp sport=46288 dport=3817 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 3817, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655152365.212890085 NORDC_MX400_1 flows src=24.156.165.54 dst=131.192.183.255 protocol=tcp sport=46288 dport=3817 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 46288, "protocol": 6, "streamName": "meraki", "clientIP": "24.156.165.54", "serverIP": "131.192.183.255" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655152365.212890085 NORDC_MX400_1 flows src=24.156.165.54 dst=131.192.183.255 protocol=tcp sport=46288 dport=3817 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655152365.212890085 NORDC_MX400_1 flows src=24.156.165.54 dst=131.192.183.255 protocol=tcp sport=46288 dport=3817 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 3817 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 46288 protocol: 6 streamName: meraki clientIP: 24.156.165.54 serverIP: 131.192.183.255
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655152365.212890085 NORDC_MX400_1 flows src=93.121.34.91 dst=200.175.219.14 protocol=tcp sport=46288 dport=3817 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 3817, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655152365.212890085 NORDC_MX400_1 flows src=93.121.34.91 dst=200.175.219.14 protocol=tcp sport=46288 dport=3817 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 46288, "protocol": 6, "streamName": "meraki", "clientIP": "93.121.34.91", "serverIP": "200.175.219.14" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655152365.212890085 NORDC_MX400_1 flows src=93.121.34.91 dst=200.175.219.14 protocol=tcp sport=46288 dport=3817 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message