input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<134>Original Address=12.248.241.178 1 1662424867.769386668 M49_MX67C_Montgomery flows src=209.121.148.222 dst=119.38.17.46 protocol=tcp sport=57120 dport=4400 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=12.248.241.178 1 1662424867.769386668 M49_MX67C_Montgomery flows src=209.121.148.222 dst=119.38.17.46 protocol=tcp sport=57120 dport=4400 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 4400
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 57120
protocol: 6
streamName: meraki
clientIP: 209.121.148.222
serverIP: 119.38.17.46 | Explain this syslog message |
<134>Original Address=12.248.241.178 1 1662424867.769386668 M49_MX67C_Montgomery flows src=246.129.127.180 dst=212.90.1.81 protocol=tcp sport=57120 dport=4400 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 4400,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=12.248.241.178 1 1662424867.769386668 M49_MX67C_Montgomery flows src=246.129.127.180 dst=212.90.1.81 protocol=tcp sport=57120 dport=4400 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 57120,
"protocol": 6,
"streamName": "meraki",
"clientIP": "246.129.127.180",
"serverIP": "212.90.1.81"
} | Create a JSON artifact from the message |
<134>Original Address=12.248.241.178 1 1662424867.769386668 M49_MX67C_Montgomery flows src=246.129.127.180 dst=212.90.1.81 protocol=tcp sport=57120 dport=4400 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=12.248.241.178 1 1662424867.769386668 M49_MX67C_Montgomery flows src=246.129.127.180 dst=212.90.1.81 protocol=tcp sport=57120 dport=4400 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 4400
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 57120
protocol: 6
streamName: meraki
clientIP: 246.129.127.180
serverIP: 212.90.1.81 | Explain this syslog message |
<134>Original Address=12.248.241.178 1 1662424867.769386668 M49_MX67C_Montgomery flows src=159.27.255.166 dst=230.239.18.119 protocol=tcp sport=57120 dport=4400 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 4400,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=12.248.241.178 1 1662424867.769386668 M49_MX67C_Montgomery flows src=159.27.255.166 dst=230.239.18.119 protocol=tcp sport=57120 dport=4400 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 57120,
"protocol": 6,
"streamName": "meraki",
"clientIP": "159.27.255.166",
"serverIP": "230.239.18.119"
} | Create a JSON artifact from the message |
<134>Original Address=12.248.241.178 1 1662424867.769386668 M49_MX67C_Montgomery flows src=159.27.255.166 dst=230.239.18.119 protocol=tcp sport=57120 dport=4400 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=12.248.241.178 1 1662424867.769386668 M49_MX67C_Montgomery flows src=159.27.255.166 dst=230.239.18.119 protocol=tcp sport=57120 dport=4400 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 4400
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 57120
protocol: 6
streamName: meraki
clientIP: 159.27.255.166
serverIP: 230.239.18.119 | Explain this syslog message |
<134>Original Address=12.248.241.178 1 1662423981.035477496 M49_MX67C_Montgomery flows src=182.118.216.254 dst=120.115.135.52 protocol=tcp sport=38316 dport=5904 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 5904,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=12.248.241.178 1 1662423981.035477496 M49_MX67C_Montgomery flows src=182.118.216.254 dst=120.115.135.52 protocol=tcp sport=38316 dport=5904 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 38316,
"protocol": 6,
"streamName": "meraki",
"clientIP": "182.118.216.254",
"serverIP": "120.115.135.52"
} | Create a JSON artifact from the message |
<134>Original Address=12.248.241.178 1 1662423981.035477496 M49_MX67C_Montgomery flows src=182.118.216.254 dst=120.115.135.52 protocol=tcp sport=38316 dport=5904 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=12.248.241.178 1 1662423981.035477496 M49_MX67C_Montgomery flows src=182.118.216.254 dst=120.115.135.52 protocol=tcp sport=38316 dport=5904 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5904
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 38316
protocol: 6
streamName: meraki
clientIP: 182.118.216.254
serverIP: 120.115.135.52 | Explain this syslog message |
<134>Original Address=12.248.241.178 1 1662423981.035477496 M49_MX67C_Montgomery flows src=131.141.242.22 dst=140.55.238.98 protocol=tcp sport=38316 dport=5904 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 5904,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=12.248.241.178 1 1662423981.035477496 M49_MX67C_Montgomery flows src=131.141.242.22 dst=140.55.238.98 protocol=tcp sport=38316 dport=5904 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 38316,
"protocol": 6,
"streamName": "meraki",
"clientIP": "131.141.242.22",
"serverIP": "140.55.238.98"
} | Create a JSON artifact from the message |
<134>Original Address=12.248.241.178 1 1662423981.035477496 M49_MX67C_Montgomery flows src=131.141.242.22 dst=140.55.238.98 protocol=tcp sport=38316 dport=5904 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=12.248.241.178 1 1662423981.035477496 M49_MX67C_Montgomery flows src=131.141.242.22 dst=140.55.238.98 protocol=tcp sport=38316 dport=5904 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5904
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 38316
protocol: 6
streamName: meraki
clientIP: 131.141.242.22
serverIP: 140.55.238.98 | Explain this syslog message |
<134>Original Address=12.248.241.178 1 1662423981.035477496 M49_MX67C_Montgomery flows src=10.67.98.219 dst=93.64.10.237 protocol=tcp sport=38316 dport=5904 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 5904,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=12.248.241.178 1 1662423981.035477496 M49_MX67C_Montgomery flows src=10.67.98.219 dst=93.64.10.237 protocol=tcp sport=38316 dport=5904 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 38316,
"protocol": 6,
"streamName": "meraki",
"clientIP": "10.67.98.219",
"serverIP": "93.64.10.237"
} | Create a JSON artifact from the message |
<134>Original Address=12.248.241.178 1 1662423981.035477496 M49_MX67C_Montgomery flows src=10.67.98.219 dst=93.64.10.237 protocol=tcp sport=38316 dport=5904 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=12.248.241.178 1 1662423981.035477496 M49_MX67C_Montgomery flows src=10.67.98.219 dst=93.64.10.237 protocol=tcp sport=38316 dport=5904 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5904
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 38316
protocol: 6
streamName: meraki
clientIP: 10.67.98.219
serverIP: 93.64.10.237 | Explain this syslog message |
<134>Original Address=12.248.241.178 1 1662423981.035477496 M49_MX67C_Montgomery flows src=219.193.245.191 dst=165.131.215.227 protocol=tcp sport=38316 dport=5904 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 5904,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=12.248.241.178 1 1662423981.035477496 M49_MX67C_Montgomery flows src=219.193.245.191 dst=165.131.215.227 protocol=tcp sport=38316 dport=5904 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 38316,
"protocol": 6,
"streamName": "meraki",
"clientIP": "219.193.245.191",
"serverIP": "165.131.215.227"
} | Create a JSON artifact from the message |
<134>Original Address=12.248.241.178 1 1662423981.035477496 M49_MX67C_Montgomery flows src=219.193.245.191 dst=165.131.215.227 protocol=tcp sport=38316 dport=5904 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=12.248.241.178 1 1662423981.035477496 M49_MX67C_Montgomery flows src=219.193.245.191 dst=165.131.215.227 protocol=tcp sport=38316 dport=5904 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5904
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 38316
protocol: 6
streamName: meraki
clientIP: 219.193.245.191
serverIP: 165.131.215.227 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1662424856.519648910 M34_MX67C_Atlanta flows src=246.52.34.133 dst=31.31.182.38 protocol=tcp sport=45774 dport=21314 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 21314,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1662424856.519648910 M34_MX67C_Atlanta flows src=246.52.34.133 dst=31.31.182.38 protocol=tcp sport=45774 dport=21314 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 45774,
"protocol": 6,
"streamName": "meraki",
"clientIP": "246.52.34.133",
"serverIP": "31.31.182.38"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1662424856.519648910 M34_MX67C_Atlanta flows src=246.52.34.133 dst=31.31.182.38 protocol=tcp sport=45774 dport=21314 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1662424856.519648910 M34_MX67C_Atlanta flows src=246.52.34.133 dst=31.31.182.38 protocol=tcp sport=45774 dport=21314 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 21314
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 45774
protocol: 6
streamName: meraki
clientIP: 246.52.34.133
serverIP: 31.31.182.38 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1662424856.519648910 M34_MX67C_Atlanta flows src=167.31.35.116 dst=83.194.170.193 protocol=tcp sport=45774 dport=21314 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 21314,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1662424856.519648910 M34_MX67C_Atlanta flows src=167.31.35.116 dst=83.194.170.193 protocol=tcp sport=45774 dport=21314 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 45774,
"protocol": 6,
"streamName": "meraki",
"clientIP": "167.31.35.116",
"serverIP": "83.194.170.193"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1662424856.519648910 M34_MX67C_Atlanta flows src=167.31.35.116 dst=83.194.170.193 protocol=tcp sport=45774 dport=21314 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1662424856.519648910 M34_MX67C_Atlanta flows src=167.31.35.116 dst=83.194.170.193 protocol=tcp sport=45774 dport=21314 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 21314
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 45774
protocol: 6
streamName: meraki
clientIP: 167.31.35.116
serverIP: 83.194.170.193 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1662424856.519648910 M34_MX67C_Atlanta flows src=152.175.25.95 dst=39.168.40.50 protocol=tcp sport=45774 dport=21314 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 21314,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1662424856.519648910 M34_MX67C_Atlanta flows src=152.175.25.95 dst=39.168.40.50 protocol=tcp sport=45774 dport=21314 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 45774,
"protocol": 6,
"streamName": "meraki",
"clientIP": "152.175.25.95",
"serverIP": "39.168.40.50"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1662424856.519648910 M34_MX67C_Atlanta flows src=152.175.25.95 dst=39.168.40.50 protocol=tcp sport=45774 dport=21314 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1662424856.519648910 M34_MX67C_Atlanta flows src=152.175.25.95 dst=39.168.40.50 protocol=tcp sport=45774 dport=21314 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 21314
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 45774
protocol: 6
streamName: meraki
clientIP: 152.175.25.95
serverIP: 39.168.40.50 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1662424856.519648910 M34_MX67C_Atlanta flows src=138.209.132.35 dst=75.123.108.160 protocol=tcp sport=45774 dport=21314 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 21314,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1662424856.519648910 M34_MX67C_Atlanta flows src=138.209.132.35 dst=75.123.108.160 protocol=tcp sport=45774 dport=21314 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 45774,
"protocol": 6,
"streamName": "meraki",
"clientIP": "138.209.132.35",
"serverIP": "75.123.108.160"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1662424856.519648910 M34_MX67C_Atlanta flows src=138.209.132.35 dst=75.123.108.160 protocol=tcp sport=45774 dport=21314 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1662424856.519648910 M34_MX67C_Atlanta flows src=138.209.132.35 dst=75.123.108.160 protocol=tcp sport=45774 dport=21314 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 21314
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 45774
protocol: 6
streamName: meraki
clientIP: 138.209.132.35
serverIP: 75.123.108.160 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1662424856.791439366 M52_MX67C_Loxley flows src=98.189.86.254 dst=171.89.52.76 protocol=tcp sport=58861 dport=5900 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 5900,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1662424856.791439366 M52_MX67C_Loxley flows src=98.189.86.254 dst=171.89.52.76 protocol=tcp sport=58861 dport=5900 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 58861,
"protocol": 6,
"streamName": "meraki",
"clientIP": "98.189.86.254",
"serverIP": "171.89.52.76"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1662424856.791439366 M52_MX67C_Loxley flows src=98.189.86.254 dst=171.89.52.76 protocol=tcp sport=58861 dport=5900 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1662424856.791439366 M52_MX67C_Loxley flows src=98.189.86.254 dst=171.89.52.76 protocol=tcp sport=58861 dport=5900 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5900
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 58861
protocol: 6
streamName: meraki
clientIP: 98.189.86.254
serverIP: 171.89.52.76 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1662424856.791439366 M52_MX67C_Loxley flows src=15.11.97.220 dst=205.179.23.197 protocol=tcp sport=58861 dport=5900 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 5900,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1662424856.791439366 M52_MX67C_Loxley flows src=15.11.97.220 dst=205.179.23.197 protocol=tcp sport=58861 dport=5900 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 58861,
"protocol": 6,
"streamName": "meraki",
"clientIP": "15.11.97.220",
"serverIP": "205.179.23.197"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1662424856.791439366 M52_MX67C_Loxley flows src=15.11.97.220 dst=205.179.23.197 protocol=tcp sport=58861 dport=5900 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1662424856.791439366 M52_MX67C_Loxley flows src=15.11.97.220 dst=205.179.23.197 protocol=tcp sport=58861 dport=5900 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5900
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 58861
protocol: 6
streamName: meraki
clientIP: 15.11.97.220
serverIP: 205.179.23.197 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1662424856.791439366 M52_MX67C_Loxley flows src=188.95.68.164 dst=32.90.56.251 protocol=tcp sport=58861 dport=5900 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 5900,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1662424856.791439366 M52_MX67C_Loxley flows src=188.95.68.164 dst=32.90.56.251 protocol=tcp sport=58861 dport=5900 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 58861,
"protocol": 6,
"streamName": "meraki",
"clientIP": "188.95.68.164",
"serverIP": "32.90.56.251"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1662424856.791439366 M52_MX67C_Loxley flows src=188.95.68.164 dst=32.90.56.251 protocol=tcp sport=58861 dport=5900 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1662424856.791439366 M52_MX67C_Loxley flows src=188.95.68.164 dst=32.90.56.251 protocol=tcp sport=58861 dport=5900 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5900
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 58861
protocol: 6
streamName: meraki
clientIP: 188.95.68.164
serverIP: 32.90.56.251 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1662424856.791439366 M52_MX67C_Loxley flows src=148.146.138.27 dst=124.40.217.199 protocol=tcp sport=58861 dport=5900 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 5900,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1662424856.791439366 M52_MX67C_Loxley flows src=148.146.138.27 dst=124.40.217.199 protocol=tcp sport=58861 dport=5900 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 58861,
"protocol": 6,
"streamName": "meraki",
"clientIP": "148.146.138.27",
"serverIP": "124.40.217.199"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1662424856.791439366 M52_MX67C_Loxley flows src=148.146.138.27 dst=124.40.217.199 protocol=tcp sport=58861 dport=5900 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1662424856.791439366 M52_MX67C_Loxley flows src=148.146.138.27 dst=124.40.217.199 protocol=tcp sport=58861 dport=5900 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5900
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 58861
protocol: 6
streamName: meraki
clientIP: 148.146.138.27
serverIP: 124.40.217.199 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1662424877.697832086 M52_MX67C_Loxley flows src=240.193.42.33 dst=167.159.118.105 protocol=tcp sport=45774 dport=14704 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 14704,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1662424877.697832086 M52_MX67C_Loxley flows src=240.193.42.33 dst=167.159.118.105 protocol=tcp sport=45774 dport=14704 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 45774,
"protocol": 6,
"streamName": "meraki",
"clientIP": "240.193.42.33",
"serverIP": "167.159.118.105"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1662424877.697832086 M52_MX67C_Loxley flows src=240.193.42.33 dst=167.159.118.105 protocol=tcp sport=45774 dport=14704 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1662424877.697832086 M52_MX67C_Loxley flows src=240.193.42.33 dst=167.159.118.105 protocol=tcp sport=45774 dport=14704 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 14704
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 45774
protocol: 6
streamName: meraki
clientIP: 240.193.42.33
serverIP: 167.159.118.105 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1662424877.697832086 M52_MX67C_Loxley flows src=225.195.188.179 dst=254.171.133.125 protocol=tcp sport=45774 dport=14704 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 14704,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1662424877.697832086 M52_MX67C_Loxley flows src=225.195.188.179 dst=254.171.133.125 protocol=tcp sport=45774 dport=14704 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 45774,
"protocol": 6,
"streamName": "meraki",
"clientIP": "225.195.188.179",
"serverIP": "254.171.133.125"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1662424877.697832086 M52_MX67C_Loxley flows src=225.195.188.179 dst=254.171.133.125 protocol=tcp sport=45774 dport=14704 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1662424877.697832086 M52_MX67C_Loxley flows src=225.195.188.179 dst=254.171.133.125 protocol=tcp sport=45774 dport=14704 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 14704
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 45774
protocol: 6
streamName: meraki
clientIP: 225.195.188.179
serverIP: 254.171.133.125 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1662424877.697832086 M52_MX67C_Loxley flows src=176.6.245.44 dst=125.215.233.159 protocol=tcp sport=45774 dport=14704 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 14704,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1662424877.697832086 M52_MX67C_Loxley flows src=176.6.245.44 dst=125.215.233.159 protocol=tcp sport=45774 dport=14704 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 45774,
"protocol": 6,
"streamName": "meraki",
"clientIP": "176.6.245.44",
"serverIP": "125.215.233.159"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1662424877.697832086 M52_MX67C_Loxley flows src=176.6.245.44 dst=125.215.233.159 protocol=tcp sport=45774 dport=14704 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1662424877.697832086 M52_MX67C_Loxley flows src=176.6.245.44 dst=125.215.233.159 protocol=tcp sport=45774 dport=14704 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 14704
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 45774
protocol: 6
streamName: meraki
clientIP: 176.6.245.44
serverIP: 125.215.233.159 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1662424877.697832086 M52_MX67C_Loxley flows src=58.167.157.69 dst=31.81.61.214 protocol=tcp sport=45774 dport=14704 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 14704,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1662424877.697832086 M52_MX67C_Loxley flows src=58.167.157.69 dst=31.81.61.214 protocol=tcp sport=45774 dport=14704 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 45774,
"protocol": 6,
"streamName": "meraki",
"clientIP": "58.167.157.69",
"serverIP": "31.81.61.214"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1662424877.697832086 M52_MX67C_Loxley flows src=58.167.157.69 dst=31.81.61.214 protocol=tcp sport=45774 dport=14704 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1662424877.697832086 M52_MX67C_Loxley flows src=58.167.157.69 dst=31.81.61.214 protocol=tcp sport=45774 dport=14704 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 14704
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 45774
protocol: 6
streamName: meraki
clientIP: 58.167.157.69
serverIP: 31.81.61.214 | Explain this syslog message |
<134>Original Address=64.139.91.93 1 1662424836.313359333 M64_MX67C_Augusta flows src=196.173.113.229 dst=15.198.250.78 protocol=tcp sport=61953 dport=1521 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 1521,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=64.139.91.93 1 1662424836.313359333 M64_MX67C_Augusta flows src=196.173.113.229 dst=15.198.250.78 protocol=tcp sport=61953 dport=1521 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 61953,
"protocol": 6,
"streamName": "meraki",
"clientIP": "196.173.113.229",
"serverIP": "15.198.250.78"
} | Create a JSON artifact from the message |
<134>Original Address=64.139.91.93 1 1662424836.313359333 M64_MX67C_Augusta flows src=196.173.113.229 dst=15.198.250.78 protocol=tcp sport=61953 dport=1521 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=64.139.91.93 1 1662424836.313359333 M64_MX67C_Augusta flows src=196.173.113.229 dst=15.198.250.78 protocol=tcp sport=61953 dport=1521 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 1521
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 61953
protocol: 6
streamName: meraki
clientIP: 196.173.113.229
serverIP: 15.198.250.78 | Explain this syslog message |
<134>Original Address=64.139.91.93 1 1662424836.313359333 M64_MX67C_Augusta flows src=172.6.42.229 dst=4.157.84.154 protocol=tcp sport=61953 dport=1521 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 1521,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=64.139.91.93 1 1662424836.313359333 M64_MX67C_Augusta flows src=172.6.42.229 dst=4.157.84.154 protocol=tcp sport=61953 dport=1521 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 61953,
"protocol": 6,
"streamName": "meraki",
"clientIP": "172.6.42.229",
"serverIP": "4.157.84.154"
} | Create a JSON artifact from the message |
<134>Original Address=64.139.91.93 1 1662424836.313359333 M64_MX67C_Augusta flows src=172.6.42.229 dst=4.157.84.154 protocol=tcp sport=61953 dport=1521 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=64.139.91.93 1 1662424836.313359333 M64_MX67C_Augusta flows src=172.6.42.229 dst=4.157.84.154 protocol=tcp sport=61953 dport=1521 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 1521
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 61953
protocol: 6
streamName: meraki
clientIP: 172.6.42.229
serverIP: 4.157.84.154 | Explain this syslog message |
<134>Original Address=64.139.91.93 1 1662424836.313359333 M64_MX67C_Augusta flows src=89.153.236.237 dst=0.238.137.219 protocol=tcp sport=61953 dport=1521 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 1521,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=64.139.91.93 1 1662424836.313359333 M64_MX67C_Augusta flows src=89.153.236.237 dst=0.238.137.219 protocol=tcp sport=61953 dport=1521 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 61953,
"protocol": 6,
"streamName": "meraki",
"clientIP": "89.153.236.237",
"serverIP": "0.238.137.219"
} | Create a JSON artifact from the message |
<134>Original Address=64.139.91.93 1 1662424836.313359333 M64_MX67C_Augusta flows src=89.153.236.237 dst=0.238.137.219 protocol=tcp sport=61953 dport=1521 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=64.139.91.93 1 1662424836.313359333 M64_MX67C_Augusta flows src=89.153.236.237 dst=0.238.137.219 protocol=tcp sport=61953 dport=1521 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 1521
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 61953
protocol: 6
streamName: meraki
clientIP: 89.153.236.237
serverIP: 0.238.137.219 | Explain this syslog message |
<134>Original Address=64.139.91.93 1 1662424836.313359333 M64_MX67C_Augusta flows src=36.156.253.137 dst=109.51.133.90 protocol=tcp sport=61953 dport=1521 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 1521,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=64.139.91.93 1 1662424836.313359333 M64_MX67C_Augusta flows src=36.156.253.137 dst=109.51.133.90 protocol=tcp sport=61953 dport=1521 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 61953,
"protocol": 6,
"streamName": "meraki",
"clientIP": "36.156.253.137",
"serverIP": "109.51.133.90"
} | Create a JSON artifact from the message |
<134>Original Address=64.139.91.93 1 1662424836.313359333 M64_MX67C_Augusta flows src=36.156.253.137 dst=109.51.133.90 protocol=tcp sport=61953 dport=1521 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=64.139.91.93 1 1662424836.313359333 M64_MX67C_Augusta flows src=36.156.253.137 dst=109.51.133.90 protocol=tcp sport=61953 dport=1521 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 1521
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 61953
protocol: 6
streamName: meraki
clientIP: 36.156.253.137
serverIP: 109.51.133.90 | Explain this syslog message |
<134>Original Address=28.247.9.178 1 1657448279.671194176 M59_MX67C_Pensacola flows src=58.135.37.152 dst=28.247.9.178 protocol=udp sport=63991 dport=55457 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 55457,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=28.247.9.178 1 1657448279.671194176 M59_MX67C_Pensacola flows src=58.135.37.152 dst=28.247.9.178 protocol=udp sport=63991 dport=55457 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 63991,
"protocol": 17,
"streamName": "meraki",
"clientIP": "58.135.37.152",
"serverIP": "28.247.9.178"
} | Create a JSON artifact from the message |
<134>Original Address=28.247.9.178 1 1657448279.671194176 M59_MX67C_Pensacola flows src=58.135.37.152 dst=28.247.9.178 protocol=udp sport=63991 dport=55457 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=28.247.9.178 1 1657448279.671194176 M59_MX67C_Pensacola flows src=58.135.37.152 dst=28.247.9.178 protocol=udp sport=63991 dport=55457 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 55457
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 63991
protocol: 17
streamName: meraki
clientIP: 58.135.37.152
serverIP: 28.247.9.178 | Explain this syslog message |
<134>Original Address=106.249.207.54 1 1657448279.671194176 M59_MX67C_Pensacola flows src=114.151.246.251 dst=106.249.207.54 protocol=udp sport=63991 dport=55457 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 55457,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=106.249.207.54 1 1657448279.671194176 M59_MX67C_Pensacola flows src=114.151.246.251 dst=106.249.207.54 protocol=udp sport=63991 dport=55457 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 63991,
"protocol": 17,
"streamName": "meraki",
"clientIP": "114.151.246.251",
"serverIP": "106.249.207.54"
} | Create a JSON artifact from the message |
<134>Original Address=106.249.207.54 1 1657448279.671194176 M59_MX67C_Pensacola flows src=114.151.246.251 dst=106.249.207.54 protocol=udp sport=63991 dport=55457 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=106.249.207.54 1 1657448279.671194176 M59_MX67C_Pensacola flows src=114.151.246.251 dst=106.249.207.54 protocol=udp sport=63991 dport=55457 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 55457
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 63991
protocol: 17
streamName: meraki
clientIP: 114.151.246.251
serverIP: 106.249.207.54 | Explain this syslog message |
<134>Original Address=131.25.73.137 1 1657448279.671194176 M59_MX67C_Pensacola flows src=62.243.63.122 dst=131.25.73.137 protocol=udp sport=63991 dport=55457 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 55457,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=131.25.73.137 1 1657448279.671194176 M59_MX67C_Pensacola flows src=62.243.63.122 dst=131.25.73.137 protocol=udp sport=63991 dport=55457 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 63991,
"protocol": 17,
"streamName": "meraki",
"clientIP": "62.243.63.122",
"serverIP": "131.25.73.137"
} | Create a JSON artifact from the message |
<134>Original Address=131.25.73.137 1 1657448279.671194176 M59_MX67C_Pensacola flows src=62.243.63.122 dst=131.25.73.137 protocol=udp sport=63991 dport=55457 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=131.25.73.137 1 1657448279.671194176 M59_MX67C_Pensacola flows src=62.243.63.122 dst=131.25.73.137 protocol=udp sport=63991 dport=55457 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 55457
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 63991
protocol: 17
streamName: meraki
clientIP: 62.243.63.122
serverIP: 131.25.73.137 | Explain this syslog message |
<134>Original Address=41.142.194.216 1 1657448279.671194176 M59_MX67C_Pensacola flows src=202.152.22.115 dst=41.142.194.216 protocol=udp sport=63991 dport=55457 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 55457,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=41.142.194.216 1 1657448279.671194176 M59_MX67C_Pensacola flows src=202.152.22.115 dst=41.142.194.216 protocol=udp sport=63991 dport=55457 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 63991,
"protocol": 17,
"streamName": "meraki",
"clientIP": "202.152.22.115",
"serverIP": "41.142.194.216"
} | Create a JSON artifact from the message |
<134>Original Address=41.142.194.216 1 1657448279.671194176 M59_MX67C_Pensacola flows src=202.152.22.115 dst=41.142.194.216 protocol=udp sport=63991 dport=55457 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=41.142.194.216 1 1657448279.671194176 M59_MX67C_Pensacola flows src=202.152.22.115 dst=41.142.194.216 protocol=udp sport=63991 dport=55457 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 55457
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 63991
protocol: 17
streamName: meraki
clientIP: 202.152.22.115
serverIP: 41.142.194.216 | Explain this syslog message |
<134>Original Address=182.113.215.177 1 1656389891.168308075 M66_MX67C_HiltonHead flows src=225.88.28.184 dst=182.113.215.177 protocol=tcp sport=49889 dport=3389 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 3389,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=182.113.215.177 1 1656389891.168308075 M66_MX67C_HiltonHead flows src=225.88.28.184 dst=182.113.215.177 protocol=tcp sport=49889 dport=3389 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 49889,
"protocol": 6,
"streamName": "meraki",
"clientIP": "225.88.28.184",
"serverIP": "182.113.215.177"
} | Create a JSON artifact from the message |
<134>Original Address=182.113.215.177 1 1656389891.168308075 M66_MX67C_HiltonHead flows src=225.88.28.184 dst=182.113.215.177 protocol=tcp sport=49889 dport=3389 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=182.113.215.177 1 1656389891.168308075 M66_MX67C_HiltonHead flows src=225.88.28.184 dst=182.113.215.177 protocol=tcp sport=49889 dport=3389 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 3389
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 49889
protocol: 6
streamName: meraki
clientIP: 225.88.28.184
serverIP: 182.113.215.177 | Explain this syslog message |
<134>Original Address=213.183.9.31 1 1656389891.168308075 M66_MX67C_HiltonHead flows src=74.182.226.143 dst=213.183.9.31 protocol=tcp sport=49889 dport=3389 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 3389,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=213.183.9.31 1 1656389891.168308075 M66_MX67C_HiltonHead flows src=74.182.226.143 dst=213.183.9.31 protocol=tcp sport=49889 dport=3389 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 49889,
"protocol": 6,
"streamName": "meraki",
"clientIP": "74.182.226.143",
"serverIP": "213.183.9.31"
} | Create a JSON artifact from the message |
<134>Original Address=213.183.9.31 1 1656389891.168308075 M66_MX67C_HiltonHead flows src=74.182.226.143 dst=213.183.9.31 protocol=tcp sport=49889 dport=3389 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=213.183.9.31 1 1656389891.168308075 M66_MX67C_HiltonHead flows src=74.182.226.143 dst=213.183.9.31 protocol=tcp sport=49889 dport=3389 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 3389
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 49889
protocol: 6
streamName: meraki
clientIP: 74.182.226.143
serverIP: 213.183.9.31 | Explain this syslog message |
<134>Original Address=131.151.16.166 1 1656389891.168308075 M66_MX67C_HiltonHead flows src=130.30.68.131 dst=131.151.16.166 protocol=tcp sport=49889 dport=3389 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 3389,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=131.151.16.166 1 1656389891.168308075 M66_MX67C_HiltonHead flows src=130.30.68.131 dst=131.151.16.166 protocol=tcp sport=49889 dport=3389 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 49889,
"protocol": 6,
"streamName": "meraki",
"clientIP": "130.30.68.131",
"serverIP": "131.151.16.166"
} | Create a JSON artifact from the message |
<134>Original Address=131.151.16.166 1 1656389891.168308075 M66_MX67C_HiltonHead flows src=130.30.68.131 dst=131.151.16.166 protocol=tcp sport=49889 dport=3389 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=131.151.16.166 1 1656389891.168308075 M66_MX67C_HiltonHead flows src=130.30.68.131 dst=131.151.16.166 protocol=tcp sport=49889 dport=3389 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 3389
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 49889
protocol: 6
streamName: meraki
clientIP: 130.30.68.131
serverIP: 131.151.16.166 | Explain this syslog message |
<134>Original Address=91.219.112.107 1 1656389891.168308075 M66_MX67C_HiltonHead flows src=127.219.29.37 dst=91.219.112.107 protocol=tcp sport=49889 dport=3389 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 3389,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=91.219.112.107 1 1656389891.168308075 M66_MX67C_HiltonHead flows src=127.219.29.37 dst=91.219.112.107 protocol=tcp sport=49889 dport=3389 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 49889,
"protocol": 6,
"streamName": "meraki",
"clientIP": "127.219.29.37",
"serverIP": "91.219.112.107"
} | Create a JSON artifact from the message |
<134>Original Address=91.219.112.107 1 1656389891.168308075 M66_MX67C_HiltonHead flows src=127.219.29.37 dst=91.219.112.107 protocol=tcp sport=49889 dport=3389 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=91.219.112.107 1 1656389891.168308075 M66_MX67C_HiltonHead flows src=127.219.29.37 dst=91.219.112.107 protocol=tcp sport=49889 dport=3389 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 3389
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 49889
protocol: 6
streamName: meraki
clientIP: 127.219.29.37
serverIP: 91.219.112.107 | Explain this syslog message |
<134>Original Address=104.69.201.99 1 1655066095.105297434 M96_MX67C_MECLawrencevilleMain flows src=99.130.186.180 dst=104.69.201.99 protocol=tcp sport=29817 dport=2086 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 2086,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=104.69.201.99 1 1655066095.105297434 M96_MX67C_MECLawrencevilleMain flows src=99.130.186.180 dst=104.69.201.99 protocol=tcp sport=29817 dport=2086 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 29817,
"protocol": 6,
"streamName": "meraki",
"clientIP": "99.130.186.180",
"serverIP": "104.69.201.99"
} | Create a JSON artifact from the message |
<134>Original Address=104.69.201.99 1 1655066095.105297434 M96_MX67C_MECLawrencevilleMain flows src=99.130.186.180 dst=104.69.201.99 protocol=tcp sport=29817 dport=2086 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=104.69.201.99 1 1655066095.105297434 M96_MX67C_MECLawrencevilleMain flows src=99.130.186.180 dst=104.69.201.99 protocol=tcp sport=29817 dport=2086 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 2086
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 29817
protocol: 6
streamName: meraki
clientIP: 99.130.186.180
serverIP: 104.69.201.99 | Explain this syslog message |
<134>Original Address=149.14.19.99 1 1655066095.105297434 M96_MX67C_MECLawrencevilleMain flows src=215.68.242.181 dst=149.14.19.99 protocol=tcp sport=29817 dport=2086 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 2086,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=149.14.19.99 1 1655066095.105297434 M96_MX67C_MECLawrencevilleMain flows src=215.68.242.181 dst=149.14.19.99 protocol=tcp sport=29817 dport=2086 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 29817,
"protocol": 6,
"streamName": "meraki",
"clientIP": "215.68.242.181",
"serverIP": "149.14.19.99"
} | Create a JSON artifact from the message |
<134>Original Address=149.14.19.99 1 1655066095.105297434 M96_MX67C_MECLawrencevilleMain flows src=215.68.242.181 dst=149.14.19.99 protocol=tcp sport=29817 dport=2086 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=149.14.19.99 1 1655066095.105297434 M96_MX67C_MECLawrencevilleMain flows src=215.68.242.181 dst=149.14.19.99 protocol=tcp sport=29817 dport=2086 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 2086
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 29817
protocol: 6
streamName: meraki
clientIP: 215.68.242.181
serverIP: 149.14.19.99 | Explain this syslog message |
<134>Original Address=3.105.161.251 1 1655066095.105297434 M96_MX67C_MECLawrencevilleMain flows src=185.199.89.51 dst=3.105.161.251 protocol=tcp sport=29817 dport=2086 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 2086,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=3.105.161.251 1 1655066095.105297434 M96_MX67C_MECLawrencevilleMain flows src=185.199.89.51 dst=3.105.161.251 protocol=tcp sport=29817 dport=2086 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 29817,
"protocol": 6,
"streamName": "meraki",
"clientIP": "185.199.89.51",
"serverIP": "3.105.161.251"
} | Create a JSON artifact from the message |
<134>Original Address=3.105.161.251 1 1655066095.105297434 M96_MX67C_MECLawrencevilleMain flows src=185.199.89.51 dst=3.105.161.251 protocol=tcp sport=29817 dport=2086 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.