input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<134>Original Address=192.168.2.253 1 1661096830.468415765 NORDC_MX400_1 flows src=153.185.44.105 dst=244.185.55.125 protocol=tcp sport=1889 dport=25 pattern: 1 dst 244.185.55.125 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096830.468415765 NORDC_MX400_1 flows src=153.185.44.105 dst=244.185.55.125 protocol=tcp sport=1889 dport=25 pattern: 1 dst 244.185.55.125 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 1889
protocol: 6
streamName: meraki
clientIP: 153.185.44.105
serverIP: 244.185.55.125 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096830.141780520 NORDC_MX400_1 flows src=162.77.89.54 dst=73.116.104.39 protocol=tcp sport=6197 dport=25 pattern: 1 dst 73.116.104.39 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096830.141780520 NORDC_MX400_1 flows src=162.77.89.54 dst=73.116.104.39 protocol=tcp sport=6197 dport=25 pattern: 1 dst 73.116.104.39",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6197,
"protocol": 6,
"streamName": "meraki",
"clientIP": "162.77.89.54",
"serverIP": "73.116.104.39"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096830.141780520 NORDC_MX400_1 flows src=162.77.89.54 dst=73.116.104.39 protocol=tcp sport=6197 dport=25 pattern: 1 dst 73.116.104.39 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096830.141780520 NORDC_MX400_1 flows src=162.77.89.54 dst=73.116.104.39 protocol=tcp sport=6197 dport=25 pattern: 1 dst 73.116.104.39 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6197
protocol: 6
streamName: meraki
clientIP: 162.77.89.54
serverIP: 73.116.104.39 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096830.141780520 NORDC_MX400_1 flows src=18.1.212.203 dst=137.170.245.80 protocol=tcp sport=6197 dport=25 pattern: 1 dst 137.170.245.80 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096830.141780520 NORDC_MX400_1 flows src=18.1.212.203 dst=137.170.245.80 protocol=tcp sport=6197 dport=25 pattern: 1 dst 137.170.245.80",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6197,
"protocol": 6,
"streamName": "meraki",
"clientIP": "18.1.212.203",
"serverIP": "137.170.245.80"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096830.141780520 NORDC_MX400_1 flows src=18.1.212.203 dst=137.170.245.80 protocol=tcp sport=6197 dport=25 pattern: 1 dst 137.170.245.80 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096830.141780520 NORDC_MX400_1 flows src=18.1.212.203 dst=137.170.245.80 protocol=tcp sport=6197 dport=25 pattern: 1 dst 137.170.245.80 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6197
protocol: 6
streamName: meraki
clientIP: 18.1.212.203
serverIP: 137.170.245.80 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096830.232683052 NORDC_MX400_1 flows src=24.92.170.155 dst=51.9.176.42 protocol=tcp sport=5572 dport=25 pattern: 1 dst 51.9.176.42 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096830.232683052 NORDC_MX400_1 flows src=24.92.170.155 dst=51.9.176.42 protocol=tcp sport=5572 dport=25 pattern: 1 dst 51.9.176.42",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 5572,
"protocol": 6,
"streamName": "meraki",
"clientIP": "24.92.170.155",
"serverIP": "51.9.176.42"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096830.232683052 NORDC_MX400_1 flows src=24.92.170.155 dst=51.9.176.42 protocol=tcp sport=5572 dport=25 pattern: 1 dst 51.9.176.42 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096830.232683052 NORDC_MX400_1 flows src=24.92.170.155 dst=51.9.176.42 protocol=tcp sport=5572 dport=25 pattern: 1 dst 51.9.176.42 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 5572
protocol: 6
streamName: meraki
clientIP: 24.92.170.155
serverIP: 51.9.176.42 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096830.232683052 NORDC_MX400_1 flows src=71.137.67.69 dst=55.22.5.48 protocol=tcp sport=5572 dport=25 pattern: 1 dst 55.22.5.48 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096830.232683052 NORDC_MX400_1 flows src=71.137.67.69 dst=55.22.5.48 protocol=tcp sport=5572 dport=25 pattern: 1 dst 55.22.5.48",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 5572,
"protocol": 6,
"streamName": "meraki",
"clientIP": "71.137.67.69",
"serverIP": "55.22.5.48"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096830.232683052 NORDC_MX400_1 flows src=71.137.67.69 dst=55.22.5.48 protocol=tcp sport=5572 dport=25 pattern: 1 dst 55.22.5.48 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096830.232683052 NORDC_MX400_1 flows src=71.137.67.69 dst=55.22.5.48 protocol=tcp sport=5572 dport=25 pattern: 1 dst 55.22.5.48 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 5572
protocol: 6
streamName: meraki
clientIP: 71.137.67.69
serverIP: 55.22.5.48 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.084040385 NORDC_MX400_1 flows src=224.167.60.163 dst=101.94.89.114 protocol=tcp sport=62176 dport=25 pattern: 1 dst 101.94.89.114 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096829.084040385 NORDC_MX400_1 flows src=224.167.60.163 dst=101.94.89.114 protocol=tcp sport=62176 dport=25 pattern: 1 dst 101.94.89.114",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 62176,
"protocol": 6,
"streamName": "meraki",
"clientIP": "224.167.60.163",
"serverIP": "101.94.89.114"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096829.084040385 NORDC_MX400_1 flows src=224.167.60.163 dst=101.94.89.114 protocol=tcp sport=62176 dport=25 pattern: 1 dst 101.94.89.114 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.084040385 NORDC_MX400_1 flows src=224.167.60.163 dst=101.94.89.114 protocol=tcp sport=62176 dport=25 pattern: 1 dst 101.94.89.114 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 62176
protocol: 6
streamName: meraki
clientIP: 224.167.60.163
serverIP: 101.94.89.114 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.084040385 NORDC_MX400_1 flows src=248.132.7.166 dst=186.216.79.144 protocol=tcp sport=62176 dport=25 pattern: 1 dst 186.216.79.144 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096829.084040385 NORDC_MX400_1 flows src=248.132.7.166 dst=186.216.79.144 protocol=tcp sport=62176 dport=25 pattern: 1 dst 186.216.79.144",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 62176,
"protocol": 6,
"streamName": "meraki",
"clientIP": "248.132.7.166",
"serverIP": "186.216.79.144"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096829.084040385 NORDC_MX400_1 flows src=248.132.7.166 dst=186.216.79.144 protocol=tcp sport=62176 dport=25 pattern: 1 dst 186.216.79.144 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.084040385 NORDC_MX400_1 flows src=248.132.7.166 dst=186.216.79.144 protocol=tcp sport=62176 dport=25 pattern: 1 dst 186.216.79.144 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 62176
protocol: 6
streamName: meraki
clientIP: 248.132.7.166
serverIP: 186.216.79.144 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.519586685 NORDC_MX400_1 flows src=97.226.115.207 dst=46.253.141.194 protocol=tcp sport=54337 dport=25 pattern: 1 dst 46.253.141.194 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096829.519586685 NORDC_MX400_1 flows src=97.226.115.207 dst=46.253.141.194 protocol=tcp sport=54337 dport=25 pattern: 1 dst 46.253.141.194",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 54337,
"protocol": 6,
"streamName": "meraki",
"clientIP": "97.226.115.207",
"serverIP": "46.253.141.194"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096829.519586685 NORDC_MX400_1 flows src=97.226.115.207 dst=46.253.141.194 protocol=tcp sport=54337 dport=25 pattern: 1 dst 46.253.141.194 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.519586685 NORDC_MX400_1 flows src=97.226.115.207 dst=46.253.141.194 protocol=tcp sport=54337 dport=25 pattern: 1 dst 46.253.141.194 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 54337
protocol: 6
streamName: meraki
clientIP: 97.226.115.207
serverIP: 46.253.141.194 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.519586685 NORDC_MX400_1 flows src=246.71.120.101 dst=85.132.243.3 protocol=tcp sport=54337 dport=25 pattern: 1 dst 85.132.243.3 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096829.519586685 NORDC_MX400_1 flows src=246.71.120.101 dst=85.132.243.3 protocol=tcp sport=54337 dport=25 pattern: 1 dst 85.132.243.3",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 54337,
"protocol": 6,
"streamName": "meraki",
"clientIP": "246.71.120.101",
"serverIP": "85.132.243.3"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096829.519586685 NORDC_MX400_1 flows src=246.71.120.101 dst=85.132.243.3 protocol=tcp sport=54337 dport=25 pattern: 1 dst 85.132.243.3 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.519586685 NORDC_MX400_1 flows src=246.71.120.101 dst=85.132.243.3 protocol=tcp sport=54337 dport=25 pattern: 1 dst 85.132.243.3 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 54337
protocol: 6
streamName: meraki
clientIP: 246.71.120.101
serverIP: 85.132.243.3 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.601296908 NORDC_MX400_1 flows src=84.75.103.34 dst=177.95.168.183 protocol=tcp sport=27808 dport=25 pattern: 1 dst 177.95.168.183 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096829.601296908 NORDC_MX400_1 flows src=84.75.103.34 dst=177.95.168.183 protocol=tcp sport=27808 dport=25 pattern: 1 dst 177.95.168.183",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 27808,
"protocol": 6,
"streamName": "meraki",
"clientIP": "84.75.103.34",
"serverIP": "177.95.168.183"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096829.601296908 NORDC_MX400_1 flows src=84.75.103.34 dst=177.95.168.183 protocol=tcp sport=27808 dport=25 pattern: 1 dst 177.95.168.183 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.601296908 NORDC_MX400_1 flows src=84.75.103.34 dst=177.95.168.183 protocol=tcp sport=27808 dport=25 pattern: 1 dst 177.95.168.183 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 27808
protocol: 6
streamName: meraki
clientIP: 84.75.103.34
serverIP: 177.95.168.183 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.601296908 NORDC_MX400_1 flows src=118.140.4.111 dst=245.155.241.75 protocol=tcp sport=27808 dport=25 pattern: 1 dst 245.155.241.75 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096829.601296908 NORDC_MX400_1 flows src=118.140.4.111 dst=245.155.241.75 protocol=tcp sport=27808 dport=25 pattern: 1 dst 245.155.241.75",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 27808,
"protocol": 6,
"streamName": "meraki",
"clientIP": "118.140.4.111",
"serverIP": "245.155.241.75"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096829.601296908 NORDC_MX400_1 flows src=118.140.4.111 dst=245.155.241.75 protocol=tcp sport=27808 dport=25 pattern: 1 dst 245.155.241.75 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.601296908 NORDC_MX400_1 flows src=118.140.4.111 dst=245.155.241.75 protocol=tcp sport=27808 dport=25 pattern: 1 dst 245.155.241.75 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 27808
protocol: 6
streamName: meraki
clientIP: 118.140.4.111
serverIP: 245.155.241.75 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.997370779 NORDC_MX400_1 flows src=81.61.132.93 dst=199.120.82.218 protocol=tcp sport=53600 dport=25 pattern: 1 dst 199.120.82.218 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096829.997370779 NORDC_MX400_1 flows src=81.61.132.93 dst=199.120.82.218 protocol=tcp sport=53600 dport=25 pattern: 1 dst 199.120.82.218",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 53600,
"protocol": 6,
"streamName": "meraki",
"clientIP": "81.61.132.93",
"serverIP": "199.120.82.218"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096829.997370779 NORDC_MX400_1 flows src=81.61.132.93 dst=199.120.82.218 protocol=tcp sport=53600 dport=25 pattern: 1 dst 199.120.82.218 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.997370779 NORDC_MX400_1 flows src=81.61.132.93 dst=199.120.82.218 protocol=tcp sport=53600 dport=25 pattern: 1 dst 199.120.82.218 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 53600
protocol: 6
streamName: meraki
clientIP: 81.61.132.93
serverIP: 199.120.82.218 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.997370779 NORDC_MX400_1 flows src=206.241.94.91 dst=50.13.162.40 protocol=tcp sport=53600 dport=25 pattern: 1 dst 50.13.162.40 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096829.997370779 NORDC_MX400_1 flows src=206.241.94.91 dst=50.13.162.40 protocol=tcp sport=53600 dport=25 pattern: 1 dst 50.13.162.40",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 53600,
"protocol": 6,
"streamName": "meraki",
"clientIP": "206.241.94.91",
"serverIP": "50.13.162.40"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096829.997370779 NORDC_MX400_1 flows src=206.241.94.91 dst=50.13.162.40 protocol=tcp sport=53600 dport=25 pattern: 1 dst 50.13.162.40 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.997370779 NORDC_MX400_1 flows src=206.241.94.91 dst=50.13.162.40 protocol=tcp sport=53600 dport=25 pattern: 1 dst 50.13.162.40 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 53600
protocol: 6
streamName: meraki
clientIP: 206.241.94.91
serverIP: 50.13.162.40 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.879609832 NORDC_MX400_1 flows src=35.236.139.76 dst=51.87.94.126 protocol=tcp sport=40807 dport=25 pattern: 1 dst 51.87.94.126 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096829.879609832 NORDC_MX400_1 flows src=35.236.139.76 dst=51.87.94.126 protocol=tcp sport=40807 dport=25 pattern: 1 dst 51.87.94.126",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 40807,
"protocol": 6,
"streamName": "meraki",
"clientIP": "35.236.139.76",
"serverIP": "51.87.94.126"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096829.879609832 NORDC_MX400_1 flows src=35.236.139.76 dst=51.87.94.126 protocol=tcp sport=40807 dport=25 pattern: 1 dst 51.87.94.126 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.879609832 NORDC_MX400_1 flows src=35.236.139.76 dst=51.87.94.126 protocol=tcp sport=40807 dport=25 pattern: 1 dst 51.87.94.126 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 40807
protocol: 6
streamName: meraki
clientIP: 35.236.139.76
serverIP: 51.87.94.126 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.879609832 NORDC_MX400_1 flows src=86.168.176.140 dst=183.215.236.4 protocol=tcp sport=40807 dport=25 pattern: 1 dst 183.215.236.4 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096829.879609832 NORDC_MX400_1 flows src=86.168.176.140 dst=183.215.236.4 protocol=tcp sport=40807 dport=25 pattern: 1 dst 183.215.236.4",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 40807,
"protocol": 6,
"streamName": "meraki",
"clientIP": "86.168.176.140",
"serverIP": "183.215.236.4"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096829.879609832 NORDC_MX400_1 flows src=86.168.176.140 dst=183.215.236.4 protocol=tcp sport=40807 dport=25 pattern: 1 dst 183.215.236.4 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.879609832 NORDC_MX400_1 flows src=86.168.176.140 dst=183.215.236.4 protocol=tcp sport=40807 dport=25 pattern: 1 dst 183.215.236.4 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 40807
protocol: 6
streamName: meraki
clientIP: 86.168.176.140
serverIP: 183.215.236.4 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096830.918310053 NORDC_MX400_1 flows src=212.214.53.89 dst=184.187.184.23 protocol=udp sport=4104 dport=4104 pattern: 1 dst 184.187.184.23 | {
"senderhost": "192.168.2.250",
"serverport": 4104,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096830.918310053 NORDC_MX400_1 flows src=212.214.53.89 dst=184.187.184.23 protocol=udp sport=4104 dport=4104 pattern: 1 dst 184.187.184.23",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 4104,
"protocol": 17,
"streamName": "meraki",
"clientIP": "184.187.184.23",
"serverIP": "212.214.53.89"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096830.918310053 NORDC_MX400_1 flows src=212.214.53.89 dst=184.187.184.23 protocol=udp sport=4104 dport=4104 pattern: 1 dst 184.187.184.23 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096830.918310053 NORDC_MX400_1 flows src=212.214.53.89 dst=184.187.184.23 protocol=udp sport=4104 dport=4104 pattern: 1 dst 184.187.184.23 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 4104
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 4104
protocol: 17
streamName: meraki
clientIP: 184.187.184.23
serverIP: 212.214.53.89 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096830.918310053 NORDC_MX400_1 flows src=190.230.220.27 dst=195.202.61.2 protocol=udp sport=4104 dport=4104 pattern: 1 dst 195.202.61.2 | {
"senderhost": "192.168.2.250",
"serverport": 4104,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096830.918310053 NORDC_MX400_1 flows src=190.230.220.27 dst=195.202.61.2 protocol=udp sport=4104 dport=4104 pattern: 1 dst 195.202.61.2",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 4104,
"protocol": 17,
"streamName": "meraki",
"clientIP": "195.202.61.2",
"serverIP": "190.230.220.27"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096830.918310053 NORDC_MX400_1 flows src=190.230.220.27 dst=195.202.61.2 protocol=udp sport=4104 dport=4104 pattern: 1 dst 195.202.61.2 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096830.918310053 NORDC_MX400_1 flows src=190.230.220.27 dst=195.202.61.2 protocol=udp sport=4104 dport=4104 pattern: 1 dst 195.202.61.2 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 4104
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 4104
protocol: 17
streamName: meraki
clientIP: 195.202.61.2
serverIP: 190.230.220.27 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=74.60.134.91 dst=161.154.69.196 protocol=tcp sport=27316 dport=25 pattern: 1 dst 161.154.69.196 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=74.60.134.91 dst=161.154.69.196 protocol=tcp sport=27316 dport=25 pattern: 1 dst 161.154.69.196",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 27316,
"protocol": 6,
"streamName": "meraki",
"clientIP": "74.60.134.91",
"serverIP": "161.154.69.196"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=74.60.134.91 dst=161.154.69.196 protocol=tcp sport=27316 dport=25 pattern: 1 dst 161.154.69.196 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=74.60.134.91 dst=161.154.69.196 protocol=tcp sport=27316 dport=25 pattern: 1 dst 161.154.69.196 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 27316
protocol: 6
streamName: meraki
clientIP: 74.60.134.91
serverIP: 161.154.69.196 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=226.147.37.130 dst=79.2.49.235 protocol=tcp sport=27316 dport=25 pattern: 1 dst 79.2.49.235 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=226.147.37.130 dst=79.2.49.235 protocol=tcp sport=27316 dport=25 pattern: 1 dst 79.2.49.235",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 27316,
"protocol": 6,
"streamName": "meraki",
"clientIP": "226.147.37.130",
"serverIP": "79.2.49.235"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=226.147.37.130 dst=79.2.49.235 protocol=tcp sport=27316 dport=25 pattern: 1 dst 79.2.49.235 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=226.147.37.130 dst=79.2.49.235 protocol=tcp sport=27316 dport=25 pattern: 1 dst 79.2.49.235 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 27316
protocol: 6
streamName: meraki
clientIP: 226.147.37.130
serverIP: 79.2.49.235 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1657178921.042876082 NORDC_MX400_1 flows src=142.50.36.161 dst=182.32.77.4 protocol=tcp sport=33750 dport=25 pattern: 1 dst 182.32.77.4 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1657178921.042876082 NORDC_MX400_1 flows src=142.50.36.161 dst=182.32.77.4 protocol=tcp sport=33750 dport=25 pattern: 1 dst 182.32.77.4",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 33750,
"protocol": 6,
"streamName": "meraki",
"clientIP": "142.50.36.161",
"serverIP": "182.32.77.4"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1657178921.042876082 NORDC_MX400_1 flows src=142.50.36.161 dst=182.32.77.4 protocol=tcp sport=33750 dport=25 pattern: 1 dst 182.32.77.4 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1657178921.042876082 NORDC_MX400_1 flows src=142.50.36.161 dst=182.32.77.4 protocol=tcp sport=33750 dport=25 pattern: 1 dst 182.32.77.4 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 33750
protocol: 6
streamName: meraki
clientIP: 142.50.36.161
serverIP: 182.32.77.4 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1657178921.042876082 NORDC_MX400_1 flows src=141.159.198.204 dst=236.56.253.106 protocol=tcp sport=33750 dport=25 pattern: 1 dst 236.56.253.106 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1657178921.042876082 NORDC_MX400_1 flows src=141.159.198.204 dst=236.56.253.106 protocol=tcp sport=33750 dport=25 pattern: 1 dst 236.56.253.106",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 33750,
"protocol": 6,
"streamName": "meraki",
"clientIP": "141.159.198.204",
"serverIP": "236.56.253.106"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1657178921.042876082 NORDC_MX400_1 flows src=141.159.198.204 dst=236.56.253.106 protocol=tcp sport=33750 dport=25 pattern: 1 dst 236.56.253.106 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1657178921.042876082 NORDC_MX400_1 flows src=141.159.198.204 dst=236.56.253.106 protocol=tcp sport=33750 dport=25 pattern: 1 dst 236.56.253.106 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 33750
protocol: 6
streamName: meraki
clientIP: 141.159.198.204
serverIP: 236.56.253.106 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1657178921.243297544 NORDC_MX400_1 flows src=220.5.153.113 dst=67.231.138.115 protocol=tcp sport=32993 dport=25 pattern: 1 dst 67.231.138.115 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1657178921.243297544 NORDC_MX400_1 flows src=220.5.153.113 dst=67.231.138.115 protocol=tcp sport=32993 dport=25 pattern: 1 dst 67.231.138.115",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 32993,
"protocol": 6,
"streamName": "meraki",
"clientIP": "220.5.153.113",
"serverIP": "67.231.138.115"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1657178921.243297544 NORDC_MX400_1 flows src=220.5.153.113 dst=67.231.138.115 protocol=tcp sport=32993 dport=25 pattern: 1 dst 67.231.138.115 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1657178921.243297544 NORDC_MX400_1 flows src=220.5.153.113 dst=67.231.138.115 protocol=tcp sport=32993 dport=25 pattern: 1 dst 67.231.138.115 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 32993
protocol: 6
streamName: meraki
clientIP: 220.5.153.113
serverIP: 67.231.138.115 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1657178921.243297544 NORDC_MX400_1 flows src=96.13.45.50 dst=53.201.196.172 protocol=tcp sport=32993 dport=25 pattern: 1 dst 53.201.196.172 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1657178921.243297544 NORDC_MX400_1 flows src=96.13.45.50 dst=53.201.196.172 protocol=tcp sport=32993 dport=25 pattern: 1 dst 53.201.196.172",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 32993,
"protocol": 6,
"streamName": "meraki",
"clientIP": "96.13.45.50",
"serverIP": "53.201.196.172"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1657178921.243297544 NORDC_MX400_1 flows src=96.13.45.50 dst=53.201.196.172 protocol=tcp sport=32993 dport=25 pattern: 1 dst 53.201.196.172 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1657178921.243297544 NORDC_MX400_1 flows src=96.13.45.50 dst=53.201.196.172 protocol=tcp sport=32993 dport=25 pattern: 1 dst 53.201.196.172 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 32993
protocol: 6
streamName: meraki
clientIP: 96.13.45.50
serverIP: 53.201.196.172 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=173.152.176.148 dst=56.163.190.40 protocol=tcp sport=27316 dport=25 pattern: 1 dst 56.163.190.40 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=173.152.176.148 dst=56.163.190.40 protocol=tcp sport=27316 dport=25 pattern: 1 dst 56.163.190.40",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 27316,
"protocol": 6,
"streamName": "meraki",
"clientIP": "173.152.176.148",
"serverIP": "56.163.190.40"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=173.152.176.148 dst=56.163.190.40 protocol=tcp sport=27316 dport=25 pattern: 1 dst 56.163.190.40 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=173.152.176.148 dst=56.163.190.40 protocol=tcp sport=27316 dport=25 pattern: 1 dst 56.163.190.40 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 27316
protocol: 6
streamName: meraki
clientIP: 173.152.176.148
serverIP: 56.163.190.40 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=232.186.101.247 dst=56.13.184.85 protocol=tcp sport=27316 dport=25 pattern: 1 dst 56.13.184.85 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=232.186.101.247 dst=56.13.184.85 protocol=tcp sport=27316 dport=25 pattern: 1 dst 56.13.184.85",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 27316,
"protocol": 6,
"streamName": "meraki",
"clientIP": "232.186.101.247",
"serverIP": "56.13.184.85"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=232.186.101.247 dst=56.13.184.85 protocol=tcp sport=27316 dport=25 pattern: 1 dst 56.13.184.85 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=232.186.101.247 dst=56.13.184.85 protocol=tcp sport=27316 dport=25 pattern: 1 dst 56.13.184.85 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 27316
protocol: 6
streamName: meraki
clientIP: 232.186.101.247
serverIP: 56.13.184.85 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1657178920.538141736 NORDC_MX400_1 flows src=246.73.147.196 dst=175.149.151.112 protocol=tcp sport=53089 dport=25 pattern: 1 dst 175.149.151.112 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1657178920.538141736 NORDC_MX400_1 flows src=246.73.147.196 dst=175.149.151.112 protocol=tcp sport=53089 dport=25 pattern: 1 dst 175.149.151.112",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 53089,
"protocol": 6,
"streamName": "meraki",
"clientIP": "246.73.147.196",
"serverIP": "175.149.151.112"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1657178920.538141736 NORDC_MX400_1 flows src=246.73.147.196 dst=175.149.151.112 protocol=tcp sport=53089 dport=25 pattern: 1 dst 175.149.151.112 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1657178920.538141736 NORDC_MX400_1 flows src=246.73.147.196 dst=175.149.151.112 protocol=tcp sport=53089 dport=25 pattern: 1 dst 175.149.151.112 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 53089
protocol: 6
streamName: meraki
clientIP: 246.73.147.196
serverIP: 175.149.151.112 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1657178920.538141736 NORDC_MX400_1 flows src=159.146.142.71 dst=17.6.107.205 protocol=tcp sport=53089 dport=25 pattern: 1 dst 17.6.107.205 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1657178920.538141736 NORDC_MX400_1 flows src=159.146.142.71 dst=17.6.107.205 protocol=tcp sport=53089 dport=25 pattern: 1 dst 17.6.107.205",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 53089,
"protocol": 6,
"streamName": "meraki",
"clientIP": "159.146.142.71",
"serverIP": "17.6.107.205"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1657178920.538141736 NORDC_MX400_1 flows src=159.146.142.71 dst=17.6.107.205 protocol=tcp sport=53089 dport=25 pattern: 1 dst 17.6.107.205 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1657178920.538141736 NORDC_MX400_1 flows src=159.146.142.71 dst=17.6.107.205 protocol=tcp sport=53089 dport=25 pattern: 1 dst 17.6.107.205 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 53089
protocol: 6
streamName: meraki
clientIP: 159.146.142.71
serverIP: 17.6.107.205 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=240.72.198.90 dst=163.26.75.177 protocol=tcp sport=54280 dport=81 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 81,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=240.72.198.90 dst=163.26.75.177 protocol=tcp sport=54280 dport=81 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 54280,
"protocol": 6,
"streamName": "meraki",
"clientIP": "240.72.198.90",
"serverIP": "163.26.75.177"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=240.72.198.90 dst=163.26.75.177 protocol=tcp sport=54280 dport=81 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=240.72.198.90 dst=163.26.75.177 protocol=tcp sport=54280 dport=81 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 81
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 54280
protocol: 6
streamName: meraki
clientIP: 240.72.198.90
serverIP: 163.26.75.177 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=169.234.225.158 dst=217.189.85.161 protocol=tcp sport=54280 dport=81 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 81,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=169.234.225.158 dst=217.189.85.161 protocol=tcp sport=54280 dport=81 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 54280,
"protocol": 6,
"streamName": "meraki",
"clientIP": "169.234.225.158",
"serverIP": "217.189.85.161"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=169.234.225.158 dst=217.189.85.161 protocol=tcp sport=54280 dport=81 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=169.234.225.158 dst=217.189.85.161 protocol=tcp sport=54280 dport=81 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 81
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 54280
protocol: 6
streamName: meraki
clientIP: 169.234.225.158
serverIP: 217.189.85.161 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=110.199.160.209 dst=112.249.90.88 protocol=tcp sport=54280 dport=81 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 81,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=110.199.160.209 dst=112.249.90.88 protocol=tcp sport=54280 dport=81 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 54280,
"protocol": 6,
"streamName": "meraki",
"clientIP": "110.199.160.209",
"serverIP": "112.249.90.88"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=110.199.160.209 dst=112.249.90.88 protocol=tcp sport=54280 dport=81 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=110.199.160.209 dst=112.249.90.88 protocol=tcp sport=54280 dport=81 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 81
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 54280
protocol: 6
streamName: meraki
clientIP: 110.199.160.209
serverIP: 112.249.90.88 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=93.187.129.186 dst=10.44.36.46 protocol=tcp sport=54280 dport=81 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 81,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=93.187.129.186 dst=10.44.36.46 protocol=tcp sport=54280 dport=81 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 54280,
"protocol": 6,
"streamName": "meraki",
"clientIP": "93.187.129.186",
"serverIP": "10.44.36.46"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=93.187.129.186 dst=10.44.36.46 protocol=tcp sport=54280 dport=81 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=93.187.129.186 dst=10.44.36.46 protocol=tcp sport=54280 dport=81 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 81
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 54280
protocol: 6
streamName: meraki
clientIP: 93.187.129.186
serverIP: 10.44.36.46 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655152365.212890085 NORDC_MX400_1 flows src=101.60.99.48 dst=17.73.33.129 protocol=tcp sport=46288 dport=3817 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 3817,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655152365.212890085 NORDC_MX400_1 flows src=101.60.99.48 dst=17.73.33.129 protocol=tcp sport=46288 dport=3817 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 46288,
"protocol": 6,
"streamName": "meraki",
"clientIP": "101.60.99.48",
"serverIP": "17.73.33.129"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655152365.212890085 NORDC_MX400_1 flows src=101.60.99.48 dst=17.73.33.129 protocol=tcp sport=46288 dport=3817 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655152365.212890085 NORDC_MX400_1 flows src=101.60.99.48 dst=17.73.33.129 protocol=tcp sport=46288 dport=3817 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 3817
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 46288
protocol: 6
streamName: meraki
clientIP: 101.60.99.48
serverIP: 17.73.33.129 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655152365.212890085 NORDC_MX400_1 flows src=24.156.165.54 dst=131.192.183.255 protocol=tcp sport=46288 dport=3817 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 3817,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655152365.212890085 NORDC_MX400_1 flows src=24.156.165.54 dst=131.192.183.255 protocol=tcp sport=46288 dport=3817 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 46288,
"protocol": 6,
"streamName": "meraki",
"clientIP": "24.156.165.54",
"serverIP": "131.192.183.255"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655152365.212890085 NORDC_MX400_1 flows src=24.156.165.54 dst=131.192.183.255 protocol=tcp sport=46288 dport=3817 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655152365.212890085 NORDC_MX400_1 flows src=24.156.165.54 dst=131.192.183.255 protocol=tcp sport=46288 dport=3817 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 3817
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 46288
protocol: 6
streamName: meraki
clientIP: 24.156.165.54
serverIP: 131.192.183.255 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655152365.212890085 NORDC_MX400_1 flows src=93.121.34.91 dst=200.175.219.14 protocol=tcp sport=46288 dport=3817 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 3817,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655152365.212890085 NORDC_MX400_1 flows src=93.121.34.91 dst=200.175.219.14 protocol=tcp sport=46288 dport=3817 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 46288,
"protocol": 6,
"streamName": "meraki",
"clientIP": "93.121.34.91",
"serverIP": "200.175.219.14"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655152365.212890085 NORDC_MX400_1 flows src=93.121.34.91 dst=200.175.219.14 protocol=tcp sport=46288 dport=3817 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |