input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<134>Original Address=192.168.2.253 1 1655152365.212890085 NORDC_MX400_1 flows src=93.121.34.91 dst=200.175.219.14 protocol=tcp sport=46288 dport=3817 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 3817
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 46288
protocol: 6
streamName: meraki
clientIP: 93.121.34.91
serverIP: 200.175.219.14 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655152365.212890085 NORDC_MX400_1 flows src=12.219.50.93 dst=167.139.110.36 protocol=tcp sport=46288 dport=3817 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 3817,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655152365.212890085 NORDC_MX400_1 flows src=12.219.50.93 dst=167.139.110.36 protocol=tcp sport=46288 dport=3817 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 46288,
"protocol": 6,
"streamName": "meraki",
"clientIP": "12.219.50.93",
"serverIP": "167.139.110.36"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655152365.212890085 NORDC_MX400_1 flows src=12.219.50.93 dst=167.139.110.36 protocol=tcp sport=46288 dport=3817 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655152365.212890085 NORDC_MX400_1 flows src=12.219.50.93 dst=167.139.110.36 protocol=tcp sport=46288 dport=3817 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 3817
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 46288
protocol: 6
streamName: meraki
clientIP: 12.219.50.93
serverIP: 167.139.110.36 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660088561.282811115 NORDC_MX400_1 flows src=238.26.161.65 dst=5.8.178.196 protocol=tcp sport=52321 dport=25 pattern: 1 dst 5.8.178.196 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660088561.282811115 NORDC_MX400_1 flows src=238.26.161.65 dst=5.8.178.196 protocol=tcp sport=52321 dport=25 pattern: 1 dst 5.8.178.196",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 52321,
"protocol": 6,
"streamName": "meraki",
"clientIP": "238.26.161.65",
"serverIP": "5.8.178.196"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660088561.282811115 NORDC_MX400_1 flows src=238.26.161.65 dst=5.8.178.196 protocol=tcp sport=52321 dport=25 pattern: 1 dst 5.8.178.196 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660088561.282811115 NORDC_MX400_1 flows src=238.26.161.65 dst=5.8.178.196 protocol=tcp sport=52321 dport=25 pattern: 1 dst 5.8.178.196 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 52321
protocol: 6
streamName: meraki
clientIP: 238.26.161.65
serverIP: 5.8.178.196 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660088561.282811115 NORDC_MX400_1 flows src=191.245.240.243 dst=231.113.16.216 protocol=tcp sport=52321 dport=25 pattern: 1 dst 231.113.16.216 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660088561.282811115 NORDC_MX400_1 flows src=191.245.240.243 dst=231.113.16.216 protocol=tcp sport=52321 dport=25 pattern: 1 dst 231.113.16.216",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 52321,
"protocol": 6,
"streamName": "meraki",
"clientIP": "191.245.240.243",
"serverIP": "231.113.16.216"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660088561.282811115 NORDC_MX400_1 flows src=191.245.240.243 dst=231.113.16.216 protocol=tcp sport=52321 dport=25 pattern: 1 dst 231.113.16.216 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660088561.282811115 NORDC_MX400_1 flows src=191.245.240.243 dst=231.113.16.216 protocol=tcp sport=52321 dport=25 pattern: 1 dst 231.113.16.216 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 52321
protocol: 6
streamName: meraki
clientIP: 191.245.240.243
serverIP: 231.113.16.216 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660088561.282811115 NORDC_MX400_1 flows src=154.0.124.199 dst=3.148.39.177 protocol=tcp sport=52321 dport=25 pattern: 1 dst 3.148.39.177 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660088561.282811115 NORDC_MX400_1 flows src=154.0.124.199 dst=3.148.39.177 protocol=tcp sport=52321 dport=25 pattern: 1 dst 3.148.39.177",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 52321,
"protocol": 6,
"streamName": "meraki",
"clientIP": "154.0.124.199",
"serverIP": "3.148.39.177"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660088561.282811115 NORDC_MX400_1 flows src=154.0.124.199 dst=3.148.39.177 protocol=tcp sport=52321 dport=25 pattern: 1 dst 3.148.39.177 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660088561.282811115 NORDC_MX400_1 flows src=154.0.124.199 dst=3.148.39.177 protocol=tcp sport=52321 dport=25 pattern: 1 dst 3.148.39.177 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 52321
protocol: 6
streamName: meraki
clientIP: 154.0.124.199
serverIP: 3.148.39.177 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660088561.282811115 NORDC_MX400_1 flows src=195.58.148.249 dst=87.4.14.103 protocol=tcp sport=52321 dport=25 pattern: 1 dst 87.4.14.103 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660088561.282811115 NORDC_MX400_1 flows src=195.58.148.249 dst=87.4.14.103 protocol=tcp sport=52321 dport=25 pattern: 1 dst 87.4.14.103",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 52321,
"protocol": 6,
"streamName": "meraki",
"clientIP": "195.58.148.249",
"serverIP": "87.4.14.103"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660088561.282811115 NORDC_MX400_1 flows src=195.58.148.249 dst=87.4.14.103 protocol=tcp sport=52321 dport=25 pattern: 1 dst 87.4.14.103 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660088561.282811115 NORDC_MX400_1 flows src=195.58.148.249 dst=87.4.14.103 protocol=tcp sport=52321 dport=25 pattern: 1 dst 87.4.14.103 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 52321
protocol: 6
streamName: meraki
clientIP: 195.58.148.249
serverIP: 87.4.14.103 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660088561.271301069 NORDC_MX400_1 flows src=183.153.65.251 dst=118.218.91.34 protocol=tcp sport=6813 dport=25 pattern: 1 dst 118.218.91.34 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660088561.271301069 NORDC_MX400_1 flows src=183.153.65.251 dst=118.218.91.34 protocol=tcp sport=6813 dport=25 pattern: 1 dst 118.218.91.34",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6813,
"protocol": 6,
"streamName": "meraki",
"clientIP": "183.153.65.251",
"serverIP": "118.218.91.34"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660088561.271301069 NORDC_MX400_1 flows src=183.153.65.251 dst=118.218.91.34 protocol=tcp sport=6813 dport=25 pattern: 1 dst 118.218.91.34 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660088561.271301069 NORDC_MX400_1 flows src=183.153.65.251 dst=118.218.91.34 protocol=tcp sport=6813 dport=25 pattern: 1 dst 118.218.91.34 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6813
protocol: 6
streamName: meraki
clientIP: 183.153.65.251
serverIP: 118.218.91.34 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660088561.271301069 NORDC_MX400_1 flows src=0.122.194.76 dst=27.184.64.175 protocol=tcp sport=6813 dport=25 pattern: 1 dst 27.184.64.175 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660088561.271301069 NORDC_MX400_1 flows src=0.122.194.76 dst=27.184.64.175 protocol=tcp sport=6813 dport=25 pattern: 1 dst 27.184.64.175",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6813,
"protocol": 6,
"streamName": "meraki",
"clientIP": "0.122.194.76",
"serverIP": "27.184.64.175"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660088561.271301069 NORDC_MX400_1 flows src=0.122.194.76 dst=27.184.64.175 protocol=tcp sport=6813 dport=25 pattern: 1 dst 27.184.64.175 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660088561.271301069 NORDC_MX400_1 flows src=0.122.194.76 dst=27.184.64.175 protocol=tcp sport=6813 dport=25 pattern: 1 dst 27.184.64.175 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6813
protocol: 6
streamName: meraki
clientIP: 0.122.194.76
serverIP: 27.184.64.175 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660088561.312937765 NORDC_MX400_1 flows src=38.5.49.13 dst=162.13.128.166 protocol=tcp sport=62776 dport=8081 pattern: 1 dst 162.13.128.166 | {
"senderhost": "192.168.2.250",
"serverport": 8081,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660088561.312937765 NORDC_MX400_1 flows src=38.5.49.13 dst=162.13.128.166 protocol=tcp sport=62776 dport=8081 pattern: 1 dst 162.13.128.166",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 62776,
"protocol": 6,
"streamName": "meraki",
"clientIP": "38.5.49.13",
"serverIP": "162.13.128.166"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660088561.312937765 NORDC_MX400_1 flows src=38.5.49.13 dst=162.13.128.166 protocol=tcp sport=62776 dport=8081 pattern: 1 dst 162.13.128.166 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660088561.312937765 NORDC_MX400_1 flows src=38.5.49.13 dst=162.13.128.166 protocol=tcp sport=62776 dport=8081 pattern: 1 dst 162.13.128.166 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 8081
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 62776
protocol: 6
streamName: meraki
clientIP: 38.5.49.13
serverIP: 162.13.128.166 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660088561.312937765 NORDC_MX400_1 flows src=186.162.210.87 dst=154.242.144.147 protocol=tcp sport=62776 dport=8081 pattern: 1 dst 154.242.144.147 | {
"senderhost": "192.168.2.250",
"serverport": 8081,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660088561.312937765 NORDC_MX400_1 flows src=186.162.210.87 dst=154.242.144.147 protocol=tcp sport=62776 dport=8081 pattern: 1 dst 154.242.144.147",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 62776,
"protocol": 6,
"streamName": "meraki",
"clientIP": "186.162.210.87",
"serverIP": "154.242.144.147"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660088561.312937765 NORDC_MX400_1 flows src=186.162.210.87 dst=154.242.144.147 protocol=tcp sport=62776 dport=8081 pattern: 1 dst 154.242.144.147 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660088561.312937765 NORDC_MX400_1 flows src=186.162.210.87 dst=154.242.144.147 protocol=tcp sport=62776 dport=8081 pattern: 1 dst 154.242.144.147 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 8081
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 62776
protocol: 6
streamName: meraki
clientIP: 186.162.210.87
serverIP: 154.242.144.147 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660088561.418408488 NORDC_MX400_1 flows src=15.83.29.94 dst=185.2.206.240 protocol=tcp sport=6563 dport=25 pattern: 1 dst 185.2.206.240 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660088561.418408488 NORDC_MX400_1 flows src=15.83.29.94 dst=185.2.206.240 protocol=tcp sport=6563 dport=25 pattern: 1 dst 185.2.206.240",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6563,
"protocol": 6,
"streamName": "meraki",
"clientIP": "15.83.29.94",
"serverIP": "185.2.206.240"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660088561.418408488 NORDC_MX400_1 flows src=15.83.29.94 dst=185.2.206.240 protocol=tcp sport=6563 dport=25 pattern: 1 dst 185.2.206.240 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660088561.418408488 NORDC_MX400_1 flows src=15.83.29.94 dst=185.2.206.240 protocol=tcp sport=6563 dport=25 pattern: 1 dst 185.2.206.240 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6563
protocol: 6
streamName: meraki
clientIP: 15.83.29.94
serverIP: 185.2.206.240 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660088561.418408488 NORDC_MX400_1 flows src=131.121.199.27 dst=165.178.13.99 protocol=tcp sport=6563 dport=25 pattern: 1 dst 165.178.13.99 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660088561.418408488 NORDC_MX400_1 flows src=131.121.199.27 dst=165.178.13.99 protocol=tcp sport=6563 dport=25 pattern: 1 dst 165.178.13.99",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6563,
"protocol": 6,
"streamName": "meraki",
"clientIP": "131.121.199.27",
"serverIP": "165.178.13.99"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660088561.418408488 NORDC_MX400_1 flows src=131.121.199.27 dst=165.178.13.99 protocol=tcp sport=6563 dport=25 pattern: 1 dst 165.178.13.99 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660088561.418408488 NORDC_MX400_1 flows src=131.121.199.27 dst=165.178.13.99 protocol=tcp sport=6563 dport=25 pattern: 1 dst 165.178.13.99 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6563
protocol: 6
streamName: meraki
clientIP: 131.121.199.27
serverIP: 165.178.13.99 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660088561.490302394 NORDC_MX400_1 flows src=163.147.175.225 dst=203.147.198.74 protocol=tcp sport=12065 dport=25 pattern: 1 dst 203.147.198.74 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660088561.490302394 NORDC_MX400_1 flows src=163.147.175.225 dst=203.147.198.74 protocol=tcp sport=12065 dport=25 pattern: 1 dst 203.147.198.74",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 12065,
"protocol": 6,
"streamName": "meraki",
"clientIP": "163.147.175.225",
"serverIP": "203.147.198.74"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660088561.490302394 NORDC_MX400_1 flows src=163.147.175.225 dst=203.147.198.74 protocol=tcp sport=12065 dport=25 pattern: 1 dst 203.147.198.74 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660088561.490302394 NORDC_MX400_1 flows src=163.147.175.225 dst=203.147.198.74 protocol=tcp sport=12065 dport=25 pattern: 1 dst 203.147.198.74 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 12065
protocol: 6
streamName: meraki
clientIP: 163.147.175.225
serverIP: 203.147.198.74 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660088561.490302394 NORDC_MX400_1 flows src=102.241.100.253 dst=26.140.65.134 protocol=tcp sport=12065 dport=25 pattern: 1 dst 26.140.65.134 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660088561.490302394 NORDC_MX400_1 flows src=102.241.100.253 dst=26.140.65.134 protocol=tcp sport=12065 dport=25 pattern: 1 dst 26.140.65.134",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 12065,
"protocol": 6,
"streamName": "meraki",
"clientIP": "102.241.100.253",
"serverIP": "26.140.65.134"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660088561.490302394 NORDC_MX400_1 flows src=102.241.100.253 dst=26.140.65.134 protocol=tcp sport=12065 dport=25 pattern: 1 dst 26.140.65.134 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660088561.490302394 NORDC_MX400_1 flows src=102.241.100.253 dst=26.140.65.134 protocol=tcp sport=12065 dport=25 pattern: 1 dst 26.140.65.134 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 12065
protocol: 6
streamName: meraki
clientIP: 102.241.100.253
serverIP: 26.140.65.134 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660088561.507417049 NORDC_MX400_1 flows src=48.101.85.122 dst=238.131.238.195 protocol=tcp sport=27971 dport=25 pattern: 1 dst 238.131.238.195 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660088561.507417049 NORDC_MX400_1 flows src=48.101.85.122 dst=238.131.238.195 protocol=tcp sport=27971 dport=25 pattern: 1 dst 238.131.238.195",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 27971,
"protocol": 6,
"streamName": "meraki",
"clientIP": "48.101.85.122",
"serverIP": "238.131.238.195"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660088561.507417049 NORDC_MX400_1 flows src=48.101.85.122 dst=238.131.238.195 protocol=tcp sport=27971 dport=25 pattern: 1 dst 238.131.238.195 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660088561.507417049 NORDC_MX400_1 flows src=48.101.85.122 dst=238.131.238.195 protocol=tcp sport=27971 dport=25 pattern: 1 dst 238.131.238.195 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 27971
protocol: 6
streamName: meraki
clientIP: 48.101.85.122
serverIP: 238.131.238.195 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660088561.507417049 NORDC_MX400_1 flows src=205.68.145.68 dst=213.66.196.37 protocol=tcp sport=27971 dport=25 pattern: 1 dst 213.66.196.37 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660088561.507417049 NORDC_MX400_1 flows src=205.68.145.68 dst=213.66.196.37 protocol=tcp sport=27971 dport=25 pattern: 1 dst 213.66.196.37",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 27971,
"protocol": 6,
"streamName": "meraki",
"clientIP": "205.68.145.68",
"serverIP": "213.66.196.37"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660088561.507417049 NORDC_MX400_1 flows src=205.68.145.68 dst=213.66.196.37 protocol=tcp sport=27971 dport=25 pattern: 1 dst 213.66.196.37 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660088561.507417049 NORDC_MX400_1 flows src=205.68.145.68 dst=213.66.196.37 protocol=tcp sport=27971 dport=25 pattern: 1 dst 213.66.196.37 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 27971
protocol: 6
streamName: meraki
clientIP: 205.68.145.68
serverIP: 213.66.196.37 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660090861.017104636 NORDC_MX400_1 flows src=3.250.207.51 dst=36.199.61.236 protocol=tcp sport=7104 dport=25 pattern: 1 dst 36.199.61.236 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660090861.017104636 NORDC_MX400_1 flows src=3.250.207.51 dst=36.199.61.236 protocol=tcp sport=7104 dport=25 pattern: 1 dst 36.199.61.236",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 7104,
"protocol": 6,
"streamName": "meraki",
"clientIP": "3.250.207.51",
"serverIP": "36.199.61.236"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660090861.017104636 NORDC_MX400_1 flows src=3.250.207.51 dst=36.199.61.236 protocol=tcp sport=7104 dport=25 pattern: 1 dst 36.199.61.236 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660090861.017104636 NORDC_MX400_1 flows src=3.250.207.51 dst=36.199.61.236 protocol=tcp sport=7104 dport=25 pattern: 1 dst 36.199.61.236 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 7104
protocol: 6
streamName: meraki
clientIP: 3.250.207.51
serverIP: 36.199.61.236 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660090861.017104636 NORDC_MX400_1 flows src=54.165.246.159 dst=163.211.239.47 protocol=tcp sport=7104 dport=25 pattern: 1 dst 163.211.239.47 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660090861.017104636 NORDC_MX400_1 flows src=54.165.246.159 dst=163.211.239.47 protocol=tcp sport=7104 dport=25 pattern: 1 dst 163.211.239.47",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 7104,
"protocol": 6,
"streamName": "meraki",
"clientIP": "54.165.246.159",
"serverIP": "163.211.239.47"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660090861.017104636 NORDC_MX400_1 flows src=54.165.246.159 dst=163.211.239.47 protocol=tcp sport=7104 dport=25 pattern: 1 dst 163.211.239.47 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660090861.017104636 NORDC_MX400_1 flows src=54.165.246.159 dst=163.211.239.47 protocol=tcp sport=7104 dport=25 pattern: 1 dst 163.211.239.47 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 7104
protocol: 6
streamName: meraki
clientIP: 54.165.246.159
serverIP: 163.211.239.47 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660090861.017104636 NORDC_MX400_1 flows src=73.149.6.137 dst=162.164.67.137 protocol=tcp sport=7104 dport=25 pattern: 1 dst 162.164.67.137 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660090861.017104636 NORDC_MX400_1 flows src=73.149.6.137 dst=162.164.67.137 protocol=tcp sport=7104 dport=25 pattern: 1 dst 162.164.67.137",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 7104,
"protocol": 6,
"streamName": "meraki",
"clientIP": "73.149.6.137",
"serverIP": "162.164.67.137"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660090861.017104636 NORDC_MX400_1 flows src=73.149.6.137 dst=162.164.67.137 protocol=tcp sport=7104 dport=25 pattern: 1 dst 162.164.67.137 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660090861.017104636 NORDC_MX400_1 flows src=73.149.6.137 dst=162.164.67.137 protocol=tcp sport=7104 dport=25 pattern: 1 dst 162.164.67.137 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 7104
protocol: 6
streamName: meraki
clientIP: 73.149.6.137
serverIP: 162.164.67.137 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660090861.017104636 NORDC_MX400_1 flows src=130.93.216.135 dst=36.9.235.6 protocol=tcp sport=7104 dport=25 pattern: 1 dst 36.9.235.6 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660090861.017104636 NORDC_MX400_1 flows src=130.93.216.135 dst=36.9.235.6 protocol=tcp sport=7104 dport=25 pattern: 1 dst 36.9.235.6",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 7104,
"protocol": 6,
"streamName": "meraki",
"clientIP": "130.93.216.135",
"serverIP": "36.9.235.6"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660090861.017104636 NORDC_MX400_1 flows src=130.93.216.135 dst=36.9.235.6 protocol=tcp sport=7104 dport=25 pattern: 1 dst 36.9.235.6 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660090861.017104636 NORDC_MX400_1 flows src=130.93.216.135 dst=36.9.235.6 protocol=tcp sport=7104 dport=25 pattern: 1 dst 36.9.235.6 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 7104
protocol: 6
streamName: meraki
clientIP: 130.93.216.135
serverIP: 36.9.235.6 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660090860.541380611 NORDC_MX400_1 flows src=14.114.193.201 dst=210.8.94.78 protocol=tcp sport=16289 dport=25 pattern: 1 dst 210.8.94.78 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660090860.541380611 NORDC_MX400_1 flows src=14.114.193.201 dst=210.8.94.78 protocol=tcp sport=16289 dport=25 pattern: 1 dst 210.8.94.78",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 16289,
"protocol": 6,
"streamName": "meraki",
"clientIP": "14.114.193.201",
"serverIP": "210.8.94.78"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660090860.541380611 NORDC_MX400_1 flows src=14.114.193.201 dst=210.8.94.78 protocol=tcp sport=16289 dport=25 pattern: 1 dst 210.8.94.78 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660090860.541380611 NORDC_MX400_1 flows src=14.114.193.201 dst=210.8.94.78 protocol=tcp sport=16289 dport=25 pattern: 1 dst 210.8.94.78 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 16289
protocol: 6
streamName: meraki
clientIP: 14.114.193.201
serverIP: 210.8.94.78 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660090860.541380611 NORDC_MX400_1 flows src=67.236.208.226 dst=96.60.232.169 protocol=tcp sport=16289 dport=25 pattern: 1 dst 96.60.232.169 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660090860.541380611 NORDC_MX400_1 flows src=67.236.208.226 dst=96.60.232.169 protocol=tcp sport=16289 dport=25 pattern: 1 dst 96.60.232.169",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 16289,
"protocol": 6,
"streamName": "meraki",
"clientIP": "67.236.208.226",
"serverIP": "96.60.232.169"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660090860.541380611 NORDC_MX400_1 flows src=67.236.208.226 dst=96.60.232.169 protocol=tcp sport=16289 dport=25 pattern: 1 dst 96.60.232.169 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660090860.541380611 NORDC_MX400_1 flows src=67.236.208.226 dst=96.60.232.169 protocol=tcp sport=16289 dport=25 pattern: 1 dst 96.60.232.169 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 16289
protocol: 6
streamName: meraki
clientIP: 67.236.208.226
serverIP: 96.60.232.169 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660090860.550018007 NORDC_MX400_1 flows src=170.215.17.151 dst=88.28.235.23 protocol=tcp sport=30322 dport=25 pattern: 1 dst 88.28.235.23 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660090860.550018007 NORDC_MX400_1 flows src=170.215.17.151 dst=88.28.235.23 protocol=tcp sport=30322 dport=25 pattern: 1 dst 88.28.235.23",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 30322,
"protocol": 6,
"streamName": "meraki",
"clientIP": "170.215.17.151",
"serverIP": "88.28.235.23"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660090860.550018007 NORDC_MX400_1 flows src=170.215.17.151 dst=88.28.235.23 protocol=tcp sport=30322 dport=25 pattern: 1 dst 88.28.235.23 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660090860.550018007 NORDC_MX400_1 flows src=170.215.17.151 dst=88.28.235.23 protocol=tcp sport=30322 dport=25 pattern: 1 dst 88.28.235.23 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 30322
protocol: 6
streamName: meraki
clientIP: 170.215.17.151
serverIP: 88.28.235.23 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660090860.550018007 NORDC_MX400_1 flows src=101.60.227.5 dst=69.78.22.46 protocol=tcp sport=30322 dport=25 pattern: 1 dst 69.78.22.46 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660090860.550018007 NORDC_MX400_1 flows src=101.60.227.5 dst=69.78.22.46 protocol=tcp sport=30322 dport=25 pattern: 1 dst 69.78.22.46",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 30322,
"protocol": 6,
"streamName": "meraki",
"clientIP": "101.60.227.5",
"serverIP": "69.78.22.46"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660090860.550018007 NORDC_MX400_1 flows src=101.60.227.5 dst=69.78.22.46 protocol=tcp sport=30322 dport=25 pattern: 1 dst 69.78.22.46 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660090860.550018007 NORDC_MX400_1 flows src=101.60.227.5 dst=69.78.22.46 protocol=tcp sport=30322 dport=25 pattern: 1 dst 69.78.22.46 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 30322
protocol: 6
streamName: meraki
clientIP: 101.60.227.5
serverIP: 69.78.22.46 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660090860.586404421 NORDC_MX400_1 flows src=61.30.219.243 dst=192.84.33.20 protocol=tcp sport=16752 dport=25 pattern: 1 dst 192.84.33.20 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660090860.586404421 NORDC_MX400_1 flows src=61.30.219.243 dst=192.84.33.20 protocol=tcp sport=16752 dport=25 pattern: 1 dst 192.84.33.20",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 16752,
"protocol": 6,
"streamName": "meraki",
"clientIP": "61.30.219.243",
"serverIP": "192.84.33.20"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660090860.586404421 NORDC_MX400_1 flows src=61.30.219.243 dst=192.84.33.20 protocol=tcp sport=16752 dport=25 pattern: 1 dst 192.84.33.20 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660090860.586404421 NORDC_MX400_1 flows src=61.30.219.243 dst=192.84.33.20 protocol=tcp sport=16752 dport=25 pattern: 1 dst 192.84.33.20 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 16752
protocol: 6
streamName: meraki
clientIP: 61.30.219.243
serverIP: 192.84.33.20 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660090860.586404421 NORDC_MX400_1 flows src=222.144.66.15 dst=168.54.68.233 protocol=tcp sport=16752 dport=25 pattern: 1 dst 168.54.68.233 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660090860.586404421 NORDC_MX400_1 flows src=222.144.66.15 dst=168.54.68.233 protocol=tcp sport=16752 dport=25 pattern: 1 dst 168.54.68.233",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 16752,
"protocol": 6,
"streamName": "meraki",
"clientIP": "222.144.66.15",
"serverIP": "168.54.68.233"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660090860.586404421 NORDC_MX400_1 flows src=222.144.66.15 dst=168.54.68.233 protocol=tcp sport=16752 dport=25 pattern: 1 dst 168.54.68.233 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660090860.586404421 NORDC_MX400_1 flows src=222.144.66.15 dst=168.54.68.233 protocol=tcp sport=16752 dport=25 pattern: 1 dst 168.54.68.233 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 16752
protocol: 6
streamName: meraki
clientIP: 222.144.66.15
serverIP: 168.54.68.233 | Explain this syslog message |
<164>Sep 18 2022 12:19:29: %ASA-4-106023: Deny tcp src outside:170.192.83.61/26741 dst dmz-1:176.200.104.159/80 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 80,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 18 2022 12:19:29: %ASA-4-106023: Deny tcp src outside:170.192.83.61/26741 dst dmz-1:176.200.104.159/80 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 26741,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "170.192.83.61",
"serverIP": "176.200.104.159"
} | Create a JSON artifact from the message |
<164>Sep 18 2022 12:19:29: %ASA-4-106023: Deny tcp src outside:170.192.83.61/26741 dst dmz-1:176.200.104.159/80 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 18 2022 12:19:29: %ASA-4-106023: Deny tcp src outside:170.192.83.61/26741 dst dmz-1:176.200.104.159/80 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 80
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 26741
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 170.192.83.61
serverIP: 176.200.104.159 | Explain this syslog message |
<164>Sep 18 2022 12:19:29: %ASA-4-106023: Deny tcp src outside:70.128.125.95/26741 dst dmz-1:188.157.200.114/80 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 80,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 18 2022 12:19:29: %ASA-4-106023: Deny tcp src outside:70.128.125.95/26741 dst dmz-1:188.157.200.114/80 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 26741,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "70.128.125.95",
"serverIP": "188.157.200.114"
} | Create a JSON artifact from the message |
<164>Sep 18 2022 12:19:29: %ASA-4-106023: Deny tcp src outside:70.128.125.95/26741 dst dmz-1:188.157.200.114/80 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 18 2022 12:19:29: %ASA-4-106023: Deny tcp src outside:70.128.125.95/26741 dst dmz-1:188.157.200.114/80 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 80
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 26741
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 70.128.125.95
serverIP: 188.157.200.114 | Explain this syslog message |
<164>Sep 18 2022 12:19:13: %ASA-4-106023: Deny tcp src outside:2.174.124.118/50181 dst dmz-1:214.225.237.143/47913 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 47913,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 18 2022 12:19:13: %ASA-4-106023: Deny tcp src outside:2.174.124.118/50181 dst dmz-1:214.225.237.143/47913 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 50181,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "2.174.124.118",
"serverIP": "214.225.237.143"
} | Create a JSON artifact from the message |
<164>Sep 18 2022 12:19:13: %ASA-4-106023: Deny tcp src outside:2.174.124.118/50181 dst dmz-1:214.225.237.143/47913 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 18 2022 12:19:13: %ASA-4-106023: Deny tcp src outside:2.174.124.118/50181 dst dmz-1:214.225.237.143/47913 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 47913
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 50181
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 2.174.124.118
serverIP: 214.225.237.143 | Explain this syslog message |
<164>Sep 18 2022 12:19:13: %ASA-4-106023: Deny tcp src outside:242.94.28.22/50181 dst dmz-1:42.186.29.103/47913 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 47913,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 18 2022 12:19:13: %ASA-4-106023: Deny tcp src outside:242.94.28.22/50181 dst dmz-1:42.186.29.103/47913 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 50181,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "242.94.28.22",
"serverIP": "42.186.29.103"
} | Create a JSON artifact from the message |
<164>Sep 18 2022 12:19:13: %ASA-4-106023: Deny tcp src outside:242.94.28.22/50181 dst dmz-1:42.186.29.103/47913 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 18 2022 12:19:13: %ASA-4-106023: Deny tcp src outside:242.94.28.22/50181 dst dmz-1:42.186.29.103/47913 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 47913
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 50181
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 242.94.28.22
serverIP: 42.186.29.103 | Explain this syslog message |
<164>Sep 18 2022 12:19:11: %ASA-4-106023: Deny tcp src outside:41.80.242.105/47683 dst dmz-1:139.91.231.237/3363 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3363,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 18 2022 12:19:11: %ASA-4-106023: Deny tcp src outside:41.80.242.105/47683 dst dmz-1:139.91.231.237/3363 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 47683,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "41.80.242.105",
"serverIP": "139.91.231.237"
} | Create a JSON artifact from the message |
<164>Sep 18 2022 12:19:11: %ASA-4-106023: Deny tcp src outside:41.80.242.105/47683 dst dmz-1:139.91.231.237/3363 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 18 2022 12:19:11: %ASA-4-106023: Deny tcp src outside:41.80.242.105/47683 dst dmz-1:139.91.231.237/3363 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3363
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 47683
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 41.80.242.105
serverIP: 139.91.231.237 | Explain this syslog message |
<164>Sep 18 2022 12:19:11: %ASA-4-106023: Deny tcp src outside:34.67.80.204/47683 dst dmz-1:117.112.166.143/3363 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 3363,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 18 2022 12:19:11: %ASA-4-106023: Deny tcp src outside:34.67.80.204/47683 dst dmz-1:117.112.166.143/3363 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 47683,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "34.67.80.204",
"serverIP": "117.112.166.143"
} | Create a JSON artifact from the message |
<164>Sep 18 2022 12:19:11: %ASA-4-106023: Deny tcp src outside:34.67.80.204/47683 dst dmz-1:117.112.166.143/3363 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 18 2022 12:19:11: %ASA-4-106023: Deny tcp src outside:34.67.80.204/47683 dst dmz-1:117.112.166.143/3363 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 3363
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 47683
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 34.67.80.204
serverIP: 117.112.166.143 | Explain this syslog message |
<164>Sep 18 2022 12:19:29: %ASA-4-106023: Deny tcp src outside:174.12.153.100/26741 dst dmz-1:38.137.243.236/80 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 80,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 18 2022 12:19:29: %ASA-4-106023: Deny tcp src outside:174.12.153.100/26741 dst dmz-1:38.137.243.236/80 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 26741,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "174.12.153.100",
"serverIP": "38.137.243.236"
} | Create a JSON artifact from the message |
<164>Sep 18 2022 12:19:29: %ASA-4-106023: Deny tcp src outside:174.12.153.100/26741 dst dmz-1:38.137.243.236/80 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 18 2022 12:19:29: %ASA-4-106023: Deny tcp src outside:174.12.153.100/26741 dst dmz-1:38.137.243.236/80 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 80
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 26741
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 174.12.153.100
serverIP: 38.137.243.236 | Explain this syslog message |
<164>Sep 18 2022 12:19:29: %ASA-4-106023: Deny tcp src outside:226.234.8.215/26741 dst dmz-1:203.137.126.129/80 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 80,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 18 2022 12:19:29: %ASA-4-106023: Deny tcp src outside:226.234.8.215/26741 dst dmz-1:203.137.126.129/80 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 26741,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "226.234.8.215",
"serverIP": "203.137.126.129"
} | Create a JSON artifact from the message |
<164>Sep 18 2022 12:19:29: %ASA-4-106023: Deny tcp src outside:226.234.8.215/26741 dst dmz-1:203.137.126.129/80 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 18 2022 12:19:29: %ASA-4-106023: Deny tcp src outside:226.234.8.215/26741 dst dmz-1:203.137.126.129/80 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 80
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 26741
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 226.234.8.215
serverIP: 203.137.126.129 | Explain this syslog message |