input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<14>Mar 31 02:15:55 DC1-PA3220-1 1,2023/03/31 02:15:54,016201032964,TRAFFIC,drop,2560,2023/03/31 02:15:54,121.24.96.131,152.149.135.30,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:15:54,0,1,47737,9988,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:15:55,0,any,0,4848417113,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:15:55.285-07:00,, | {
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"serverport": 9988,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"productids": [
20,
0
],
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Mar 31 02:15:55 DC1-PA3220-1 1,2023/03/31 02:15:54,016201032964,TRAFFIC,drop,2560,2023/03/31 02:15:54,121.24.96.131,152.149.135.30,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:15:54,0,1,47737,9988,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:15:55,0,any,0,4848417113,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:15:55.285-07:00,,",
"action": "block",
"localstarttime": "Mar 31 02:15:55",
"sensitivity": "normal",
"application": "not-applicable",
"localhostname": "DC1-PA3220-1",
"priority": 14,
"clientpackets": 1,
"totalbytes": 60,
"facilitylabel": "user-level",
"messagetype": "traffic_drop",
"clientport": 47737,
"protocol": 6,
"facilitycode": 1,
"clientbytes": 60,
"streamName": "pan_firewall",
"clientIP": "121.24.96.131",
"serverIP": "152.149.135.30"
} | Create a JSON artifact from the message |
<14>Mar 31 02:15:55 DC1-PA3220-1 1,2023/03/31 02:15:54,016201032964,TRAFFIC,drop,2560,2023/03/31 02:15:54,121.24.96.131,152.149.135.30,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:15:54,0,1,47737,9988,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:15:55,0,any,0,4848417113,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:15:55.285-07:00,, | Product: PAN NGFW
Vendor: Palo Alto | Identify this syslog message |
<14>Mar 31 02:15:55 DC1-PA3220-1 1,2023/03/31 02:15:54,016201032964,TRAFFIC,drop,2560,2023/03/31 02:15:54,121.24.96.131,152.149.135.30,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:15:54,0,1,47737,9988,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:15:55,0,any,0,4848417113,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:15:55.285-07:00,, | This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: Geo Block Inbound
senderhost: 10.99.10.30
serverport: 9988
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
productids: [20, 0]
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: Mar 31 02:15:55
sensitivity: normal
application: not-applicable
localhostname: DC1-PA3220-1
priority: 14
clientpackets: 1
totalbytes: 60
facilitylabel: user-level
messagetype: traffic_drop
clientport: 47737
protocol: 6
facilitycode: 1
clientbytes: 60
streamName: pan_firewall
clientIP: 121.24.96.131
serverIP: 152.149.135.30 | Explain this syslog message |
<14>Mar 31 02:15:55 DC1-PA3220-1 1,2023/03/31 02:15:54,016201032964,TRAFFIC,drop,2560,2023/03/31 02:15:54,69.160.19.239,159.216.149.119,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:15:54,0,1,47737,9988,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:15:55,0,any,0,4848417113,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:15:55.285-07:00,, | {
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"serverport": 9988,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"productids": [
20,
0
],
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Mar 31 02:15:55 DC1-PA3220-1 1,2023/03/31 02:15:54,016201032964,TRAFFIC,drop,2560,2023/03/31 02:15:54,69.160.19.239,159.216.149.119,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:15:54,0,1,47737,9988,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:15:55,0,any,0,4848417113,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:15:55.285-07:00,,",
"action": "block",
"localstarttime": "Mar 31 02:15:55",
"sensitivity": "normal",
"application": "not-applicable",
"localhostname": "DC1-PA3220-1",
"priority": 14,
"clientpackets": 1,
"totalbytes": 60,
"facilitylabel": "user-level",
"messagetype": "traffic_drop",
"clientport": 47737,
"protocol": 6,
"facilitycode": 1,
"clientbytes": 60,
"streamName": "pan_firewall",
"clientIP": "69.160.19.239",
"serverIP": "159.216.149.119"
} | Create a JSON artifact from the message |
<14>Mar 31 02:15:55 DC1-PA3220-1 1,2023/03/31 02:15:54,016201032964,TRAFFIC,drop,2560,2023/03/31 02:15:54,69.160.19.239,159.216.149.119,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:15:54,0,1,47737,9988,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:15:55,0,any,0,4848417113,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:15:55.285-07:00,, | Product: PAN NGFW
Vendor: Palo Alto | Identify this syslog message |
<14>Mar 31 02:15:55 DC1-PA3220-1 1,2023/03/31 02:15:54,016201032964,TRAFFIC,drop,2560,2023/03/31 02:15:54,69.160.19.239,159.216.149.119,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:15:54,0,1,47737,9988,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:15:55,0,any,0,4848417113,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:15:55.285-07:00,, | This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: Geo Block Inbound
senderhost: 10.99.10.30
serverport: 9988
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
productids: [20, 0]
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: Mar 31 02:15:55
sensitivity: normal
application: not-applicable
localhostname: DC1-PA3220-1
priority: 14
clientpackets: 1
totalbytes: 60
facilitylabel: user-level
messagetype: traffic_drop
clientport: 47737
protocol: 6
facilitycode: 1
clientbytes: 60
streamName: pan_firewall
clientIP: 69.160.19.239
serverIP: 159.216.149.119 | Explain this syslog message |
<14>Mar 31 02:15:27 DC1-PA3220-1 1,2023/03/31 02:15:26,016201032964,TRAFFIC,drop,2560,2023/03/31 02:15:26,218.148.45.119,51.36.131.154,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:15:26,0,1,41076,4292,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:15:27,0,any,0,4848414492,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:15:27.279-07:00,, | {
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"serverport": 4292,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"productids": [
20,
0
],
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Mar 31 02:15:27 DC1-PA3220-1 1,2023/03/31 02:15:26,016201032964,TRAFFIC,drop,2560,2023/03/31 02:15:26,218.148.45.119,51.36.131.154,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:15:26,0,1,41076,4292,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:15:27,0,any,0,4848414492,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:15:27.279-07:00,,",
"action": "block",
"localstarttime": "Mar 31 02:15:27",
"sensitivity": "normal",
"application": "not-applicable",
"localhostname": "DC1-PA3220-1",
"priority": 14,
"clientpackets": 1,
"totalbytes": 60,
"facilitylabel": "user-level",
"messagetype": "traffic_drop",
"clientport": 41076,
"protocol": 6,
"facilitycode": 1,
"clientbytes": 60,
"streamName": "pan_firewall",
"clientIP": "218.148.45.119",
"serverIP": "51.36.131.154"
} | Create a JSON artifact from the message |
<14>Mar 31 02:15:27 DC1-PA3220-1 1,2023/03/31 02:15:26,016201032964,TRAFFIC,drop,2560,2023/03/31 02:15:26,218.148.45.119,51.36.131.154,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:15:26,0,1,41076,4292,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:15:27,0,any,0,4848414492,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:15:27.279-07:00,, | Product: PAN NGFW
Vendor: Palo Alto | Identify this syslog message |
<14>Mar 31 02:15:27 DC1-PA3220-1 1,2023/03/31 02:15:26,016201032964,TRAFFIC,drop,2560,2023/03/31 02:15:26,218.148.45.119,51.36.131.154,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:15:26,0,1,41076,4292,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:15:27,0,any,0,4848414492,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:15:27.279-07:00,, | This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: Geo Block Inbound
senderhost: 10.99.10.30
serverport: 4292
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
productids: [20, 0]
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: Mar 31 02:15:27
sensitivity: normal
application: not-applicable
localhostname: DC1-PA3220-1
priority: 14
clientpackets: 1
totalbytes: 60
facilitylabel: user-level
messagetype: traffic_drop
clientport: 41076
protocol: 6
facilitycode: 1
clientbytes: 60
streamName: pan_firewall
clientIP: 218.148.45.119
serverIP: 51.36.131.154 | Explain this syslog message |
<14>Mar 31 02:15:27 DC1-PA3220-1 1,2023/03/31 02:15:26,016201032964,TRAFFIC,drop,2560,2023/03/31 02:15:26,180.33.135.216,236.12.65.119,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:15:26,0,1,41076,4292,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:15:27,0,any,0,4848414492,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:15:27.279-07:00,, | {
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"serverport": 4292,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"productids": [
20,
0
],
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Mar 31 02:15:27 DC1-PA3220-1 1,2023/03/31 02:15:26,016201032964,TRAFFIC,drop,2560,2023/03/31 02:15:26,180.33.135.216,236.12.65.119,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:15:26,0,1,41076,4292,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:15:27,0,any,0,4848414492,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:15:27.279-07:00,,",
"action": "block",
"localstarttime": "Mar 31 02:15:27",
"sensitivity": "normal",
"application": "not-applicable",
"localhostname": "DC1-PA3220-1",
"priority": 14,
"clientpackets": 1,
"totalbytes": 60,
"facilitylabel": "user-level",
"messagetype": "traffic_drop",
"clientport": 41076,
"protocol": 6,
"facilitycode": 1,
"clientbytes": 60,
"streamName": "pan_firewall",
"clientIP": "180.33.135.216",
"serverIP": "236.12.65.119"
} | Create a JSON artifact from the message |
<14>Mar 31 02:15:27 DC1-PA3220-1 1,2023/03/31 02:15:26,016201032964,TRAFFIC,drop,2560,2023/03/31 02:15:26,180.33.135.216,236.12.65.119,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:15:26,0,1,41076,4292,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:15:27,0,any,0,4848414492,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:15:27.279-07:00,, | Product: PAN NGFW
Vendor: Palo Alto | Identify this syslog message |
<14>Mar 31 02:15:27 DC1-PA3220-1 1,2023/03/31 02:15:26,016201032964,TRAFFIC,drop,2560,2023/03/31 02:15:26,180.33.135.216,236.12.65.119,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:15:26,0,1,41076,4292,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:15:27,0,any,0,4848414492,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:15:27.279-07:00,, | This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: Geo Block Inbound
senderhost: 10.99.10.30
serverport: 4292
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
productids: [20, 0]
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: Mar 31 02:15:27
sensitivity: normal
application: not-applicable
localhostname: DC1-PA3220-1
priority: 14
clientpackets: 1
totalbytes: 60
facilitylabel: user-level
messagetype: traffic_drop
clientport: 41076
protocol: 6
facilitycode: 1
clientbytes: 60
streamName: pan_firewall
clientIP: 180.33.135.216
serverIP: 236.12.65.119 | Explain this syslog message |
<14>Mar 31 02:15:27 DC1-PA3220-1 1,2023/03/31 02:15:26,016201032964,TRAFFIC,drop,2560,2023/03/31 02:15:26,214.15.4.77,92.221.108.151,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:15:26,0,1,41076,4292,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:15:27,0,any,0,4848414492,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:15:27.279-07:00,, | {
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"serverport": 4292,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"productids": [
20,
0
],
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Mar 31 02:15:27 DC1-PA3220-1 1,2023/03/31 02:15:26,016201032964,TRAFFIC,drop,2560,2023/03/31 02:15:26,214.15.4.77,92.221.108.151,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:15:26,0,1,41076,4292,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:15:27,0,any,0,4848414492,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:15:27.279-07:00,,",
"action": "block",
"localstarttime": "Mar 31 02:15:27",
"sensitivity": "normal",
"application": "not-applicable",
"localhostname": "DC1-PA3220-1",
"priority": 14,
"clientpackets": 1,
"totalbytes": 60,
"facilitylabel": "user-level",
"messagetype": "traffic_drop",
"clientport": 41076,
"protocol": 6,
"facilitycode": 1,
"clientbytes": 60,
"streamName": "pan_firewall",
"clientIP": "214.15.4.77",
"serverIP": "92.221.108.151"
} | Create a JSON artifact from the message |
<14>Mar 31 02:15:27 DC1-PA3220-1 1,2023/03/31 02:15:26,016201032964,TRAFFIC,drop,2560,2023/03/31 02:15:26,214.15.4.77,92.221.108.151,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:15:26,0,1,41076,4292,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:15:27,0,any,0,4848414492,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:15:27.279-07:00,, | Product: PAN NGFW
Vendor: Palo Alto | Identify this syslog message |
<14>Mar 31 02:15:27 DC1-PA3220-1 1,2023/03/31 02:15:26,016201032964,TRAFFIC,drop,2560,2023/03/31 02:15:26,214.15.4.77,92.221.108.151,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:15:26,0,1,41076,4292,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:15:27,0,any,0,4848414492,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:15:27.279-07:00,, | This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: Geo Block Inbound
senderhost: 10.99.10.30
serverport: 4292
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
productids: [20, 0]
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: Mar 31 02:15:27
sensitivity: normal
application: not-applicable
localhostname: DC1-PA3220-1
priority: 14
clientpackets: 1
totalbytes: 60
facilitylabel: user-level
messagetype: traffic_drop
clientport: 41076
protocol: 6
facilitycode: 1
clientbytes: 60
streamName: pan_firewall
clientIP: 214.15.4.77
serverIP: 92.221.108.151 | Explain this syslog message |
<14>Mar 31 02:15:27 DC1-PA3220-1 1,2023/03/31 02:15:26,016201032964,TRAFFIC,drop,2560,2023/03/31 02:15:26,229.42.60.130,73.187.11.122,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:15:26,0,1,41076,4292,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:15:27,0,any,0,4848414492,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:15:27.279-07:00,, | {
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"serverport": 4292,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"productids": [
20,
0
],
"severitycode": 6,
"sourceinfo": "unknown",
"message": "<14>Mar 31 02:15:27 DC1-PA3220-1 1,2023/03/31 02:15:26,016201032964,TRAFFIC,drop,2560,2023/03/31 02:15:26,229.42.60.130,73.187.11.122,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:15:26,0,1,41076,4292,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:15:27,0,any,0,4848414492,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:15:27.279-07:00,,",
"action": "block",
"localstarttime": "Mar 31 02:15:27",
"sensitivity": "normal",
"application": "not-applicable",
"localhostname": "DC1-PA3220-1",
"priority": 14,
"clientpackets": 1,
"totalbytes": 60,
"facilitylabel": "user-level",
"messagetype": "traffic_drop",
"clientport": 41076,
"protocol": 6,
"facilitycode": 1,
"clientbytes": 60,
"streamName": "pan_firewall",
"clientIP": "229.42.60.130",
"serverIP": "73.187.11.122"
} | Create a JSON artifact from the message |
<14>Mar 31 02:15:27 DC1-PA3220-1 1,2023/03/31 02:15:26,016201032964,TRAFFIC,drop,2560,2023/03/31 02:15:26,229.42.60.130,73.187.11.122,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:15:26,0,1,41076,4292,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:15:27,0,any,0,4848414492,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:15:27.279-07:00,, | Product: PAN NGFW
Vendor: Palo Alto | Identify this syslog message |
<14>Mar 31 02:15:27 DC1-PA3220-1 1,2023/03/31 02:15:26,016201032964,TRAFFIC,drop,2560,2023/03/31 02:15:26,229.42.60.130,73.187.11.122,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/03/31 02:15:26,0,1,41076,4292,0,0,0x0,tcp,deny,60,60,0,1,2023/03/31 02:15:27,0,any,0,4848414492,0x0,Russian Federation,United States,0,1,0,policy-deny,253,0,0,0,,DC1-PA3220-1,from-policy,,,0,,0,,N/A,0,0,0,0,7ce986cd-09a4-4d62-9f2c-f3f40200a7b6,0,0,,,,,,,,0.0.0.0,,,,,,,,,,,,,,,,,,,,,,,,,,,2023-03-31T02:15:27.279-07:00,, | This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: Geo Block Inbound
senderhost: 10.99.10.30
serverport: 4292
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
productids: [20, 0]
severitycode: 6
sourceinfo: unknown
action: block
localstarttime: Mar 31 02:15:27
sensitivity: normal
application: not-applicable
localhostname: DC1-PA3220-1
priority: 14
clientpackets: 1
totalbytes: 60
facilitylabel: user-level
messagetype: traffic_drop
clientport: 41076
protocol: 6
facilitycode: 1
clientbytes: 60
streamName: pan_firewall
clientIP: 229.42.60.130
serverIP: 73.187.11.122 | Explain this syslog message |
<134>Original Address=205.170.169.42 1 1656855484.341088833 M58_MX67_FtWalton flows src=124.168.11.93 dst=74.96.65.186 protocol=tcp sport=55293 dport=22 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 22,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=205.170.169.42 1 1656855484.341088833 M58_MX67_FtWalton flows src=124.168.11.93 dst=74.96.65.186 protocol=tcp sport=55293 dport=22 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 55293,
"protocol": 6,
"streamName": "meraki",
"clientIP": "124.168.11.93",
"serverIP": "74.96.65.186"
} | Create a JSON artifact from the message |
<134>Original Address=205.170.169.42 1 1656855484.341088833 M58_MX67_FtWalton flows src=124.168.11.93 dst=74.96.65.186 protocol=tcp sport=55293 dport=22 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=205.170.169.42 1 1656855484.341088833 M58_MX67_FtWalton flows src=124.168.11.93 dst=74.96.65.186 protocol=tcp sport=55293 dport=22 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 22
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 55293
protocol: 6
streamName: meraki
clientIP: 124.168.11.93
serverIP: 74.96.65.186 | Explain this syslog message |
<134>Original Address=205.170.169.42 1 1656855484.341088833 M58_MX67_FtWalton flows src=156.20.169.177 dst=21.130.96.45 protocol=tcp sport=55293 dport=22 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 22,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=205.170.169.42 1 1656855484.341088833 M58_MX67_FtWalton flows src=156.20.169.177 dst=21.130.96.45 protocol=tcp sport=55293 dport=22 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 55293,
"protocol": 6,
"streamName": "meraki",
"clientIP": "156.20.169.177",
"serverIP": "21.130.96.45"
} | Create a JSON artifact from the message |
<134>Original Address=205.170.169.42 1 1656855484.341088833 M58_MX67_FtWalton flows src=156.20.169.177 dst=21.130.96.45 protocol=tcp sport=55293 dport=22 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=205.170.169.42 1 1656855484.341088833 M58_MX67_FtWalton flows src=156.20.169.177 dst=21.130.96.45 protocol=tcp sport=55293 dport=22 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 22
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 55293
protocol: 6
streamName: meraki
clientIP: 156.20.169.177
serverIP: 21.130.96.45 | Explain this syslog message |
<134>Original Address=205.170.169.42 1 1656855484.341088833 M58_MX67_FtWalton flows src=45.114.139.167 dst=60.138.55.61 protocol=tcp sport=55293 dport=22 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 22,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=205.170.169.42 1 1656855484.341088833 M58_MX67_FtWalton flows src=45.114.139.167 dst=60.138.55.61 protocol=tcp sport=55293 dport=22 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 55293,
"protocol": 6,
"streamName": "meraki",
"clientIP": "45.114.139.167",
"serverIP": "60.138.55.61"
} | Create a JSON artifact from the message |
<134>Original Address=205.170.169.42 1 1656855484.341088833 M58_MX67_FtWalton flows src=45.114.139.167 dst=60.138.55.61 protocol=tcp sport=55293 dport=22 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=205.170.169.42 1 1656855484.341088833 M58_MX67_FtWalton flows src=45.114.139.167 dst=60.138.55.61 protocol=tcp sport=55293 dport=22 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 22
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 55293
protocol: 6
streamName: meraki
clientIP: 45.114.139.167
serverIP: 60.138.55.61 | Explain this syslog message |
<134>Original Address=205.170.169.42 1 1656855484.341088833 M58_MX67_FtWalton flows src=190.20.152.71 dst=226.189.122.121 protocol=tcp sport=55293 dport=22 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 22,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=205.170.169.42 1 1656855484.341088833 M58_MX67_FtWalton flows src=190.20.152.71 dst=226.189.122.121 protocol=tcp sport=55293 dport=22 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 55293,
"protocol": 6,
"streamName": "meraki",
"clientIP": "190.20.152.71",
"serverIP": "226.189.122.121"
} | Create a JSON artifact from the message |
<134>Original Address=205.170.169.42 1 1656855484.341088833 M58_MX67_FtWalton flows src=190.20.152.71 dst=226.189.122.121 protocol=tcp sport=55293 dport=22 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=205.170.169.42 1 1656855484.341088833 M58_MX67_FtWalton flows src=190.20.152.71 dst=226.189.122.121 protocol=tcp sport=55293 dport=22 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 22
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 55293
protocol: 6
streamName: meraki
clientIP: 190.20.152.71
serverIP: 226.189.122.121 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1656855201.465360573 M61_MX67C_Savannah flows src=221.163.5.224 dst=36.73.200.191 protocol=tcp sport=42035 dport=3027 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 3027,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1656855201.465360573 M61_MX67C_Savannah flows src=221.163.5.224 dst=36.73.200.191 protocol=tcp sport=42035 dport=3027 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 42035,
"protocol": 6,
"streamName": "meraki",
"clientIP": "221.163.5.224",
"serverIP": "36.73.200.191"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1656855201.465360573 M61_MX67C_Savannah flows src=221.163.5.224 dst=36.73.200.191 protocol=tcp sport=42035 dport=3027 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1656855201.465360573 M61_MX67C_Savannah flows src=221.163.5.224 dst=36.73.200.191 protocol=tcp sport=42035 dport=3027 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 3027
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 42035
protocol: 6
streamName: meraki
clientIP: 221.163.5.224
serverIP: 36.73.200.191 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1656855201.465360573 M61_MX67C_Savannah flows src=158.210.129.89 dst=249.2.97.59 protocol=tcp sport=42035 dport=3027 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 3027,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1656855201.465360573 M61_MX67C_Savannah flows src=158.210.129.89 dst=249.2.97.59 protocol=tcp sport=42035 dport=3027 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 42035,
"protocol": 6,
"streamName": "meraki",
"clientIP": "158.210.129.89",
"serverIP": "249.2.97.59"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1656855201.465360573 M61_MX67C_Savannah flows src=158.210.129.89 dst=249.2.97.59 protocol=tcp sport=42035 dport=3027 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1656855201.465360573 M61_MX67C_Savannah flows src=158.210.129.89 dst=249.2.97.59 protocol=tcp sport=42035 dport=3027 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 3027
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 42035
protocol: 6
streamName: meraki
clientIP: 158.210.129.89
serverIP: 249.2.97.59 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1656855201.465360573 M61_MX67C_Savannah flows src=147.86.255.229 dst=132.184.237.171 protocol=tcp sport=42035 dport=3027 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 3027,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1656855201.465360573 M61_MX67C_Savannah flows src=147.86.255.229 dst=132.184.237.171 protocol=tcp sport=42035 dport=3027 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 42035,
"protocol": 6,
"streamName": "meraki",
"clientIP": "147.86.255.229",
"serverIP": "132.184.237.171"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1656855201.465360573 M61_MX67C_Savannah flows src=147.86.255.229 dst=132.184.237.171 protocol=tcp sport=42035 dport=3027 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1656855201.465360573 M61_MX67C_Savannah flows src=147.86.255.229 dst=132.184.237.171 protocol=tcp sport=42035 dport=3027 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 3027
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 42035
protocol: 6
streamName: meraki
clientIP: 147.86.255.229
serverIP: 132.184.237.171 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1656855201.465360573 M61_MX67C_Savannah flows src=151.142.253.225 dst=111.116.202.213 protocol=tcp sport=42035 dport=3027 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 3027,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1656855201.465360573 M61_MX67C_Savannah flows src=151.142.253.225 dst=111.116.202.213 protocol=tcp sport=42035 dport=3027 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 42035,
"protocol": 6,
"streamName": "meraki",
"clientIP": "151.142.253.225",
"serverIP": "111.116.202.213"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1656855201.465360573 M61_MX67C_Savannah flows src=151.142.253.225 dst=111.116.202.213 protocol=tcp sport=42035 dport=3027 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1656855201.465360573 M61_MX67C_Savannah flows src=151.142.253.225 dst=111.116.202.213 protocol=tcp sport=42035 dport=3027 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 3027
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 42035
protocol: 6
streamName: meraki
clientIP: 151.142.253.225
serverIP: 111.116.202.213 | Explain this syslog message |
<134>Original Address=25.13.196.218 1 1656855197.442922723 M52_MX67C_Loxley flows src=125.139.206.250 dst=25.13.196.218 protocol=tcp sport=42035 dport=65498 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 42035,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=25.13.196.218 1 1656855197.442922723 M52_MX67C_Loxley flows src=125.139.206.250 dst=25.13.196.218 protocol=tcp sport=42035 dport=65498 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 65498,
"protocol": 6,
"streamName": "meraki",
"clientIP": "25.13.196.218",
"serverIP": "125.139.206.250"
} | Create a JSON artifact from the message |
<134>Original Address=25.13.196.218 1 1656855197.442922723 M52_MX67C_Loxley flows src=125.139.206.250 dst=25.13.196.218 protocol=tcp sport=42035 dport=65498 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=25.13.196.218 1 1656855197.442922723 M52_MX67C_Loxley flows src=125.139.206.250 dst=25.13.196.218 protocol=tcp sport=42035 dport=65498 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 42035
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 65498
protocol: 6
streamName: meraki
clientIP: 25.13.196.218
serverIP: 125.139.206.250 | Explain this syslog message |
<134>Original Address=110.49.38.90 1 1656855197.442922723 M52_MX67C_Loxley flows src=148.141.20.214 dst=110.49.38.90 protocol=tcp sport=42035 dport=65498 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 42035,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=110.49.38.90 1 1656855197.442922723 M52_MX67C_Loxley flows src=148.141.20.214 dst=110.49.38.90 protocol=tcp sport=42035 dport=65498 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 65498,
"protocol": 6,
"streamName": "meraki",
"clientIP": "110.49.38.90",
"serverIP": "148.141.20.214"
} | Create a JSON artifact from the message |
<134>Original Address=110.49.38.90 1 1656855197.442922723 M52_MX67C_Loxley flows src=148.141.20.214 dst=110.49.38.90 protocol=tcp sport=42035 dport=65498 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=110.49.38.90 1 1656855197.442922723 M52_MX67C_Loxley flows src=148.141.20.214 dst=110.49.38.90 protocol=tcp sport=42035 dport=65498 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 42035
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 65498
protocol: 6
streamName: meraki
clientIP: 110.49.38.90
serverIP: 148.141.20.214 | Explain this syslog message |
<134>Original Address=141.2.12.215 1 1656855197.442922723 M52_MX67C_Loxley flows src=133.143.156.126 dst=141.2.12.215 protocol=tcp sport=42035 dport=65498 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 42035,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=141.2.12.215 1 1656855197.442922723 M52_MX67C_Loxley flows src=133.143.156.126 dst=141.2.12.215 protocol=tcp sport=42035 dport=65498 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 65498,
"protocol": 6,
"streamName": "meraki",
"clientIP": "141.2.12.215",
"serverIP": "133.143.156.126"
} | Create a JSON artifact from the message |
<134>Original Address=141.2.12.215 1 1656855197.442922723 M52_MX67C_Loxley flows src=133.143.156.126 dst=141.2.12.215 protocol=tcp sport=42035 dport=65498 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=141.2.12.215 1 1656855197.442922723 M52_MX67C_Loxley flows src=133.143.156.126 dst=141.2.12.215 protocol=tcp sport=42035 dport=65498 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 42035
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 65498
protocol: 6
streamName: meraki
clientIP: 141.2.12.215
serverIP: 133.143.156.126 | Explain this syslog message |
<134>Original Address=128.142.55.189 1 1656855197.442922723 M52_MX67C_Loxley flows src=66.249.38.99 dst=128.142.55.189 protocol=tcp sport=42035 dport=65498 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 42035,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=128.142.55.189 1 1656855197.442922723 M52_MX67C_Loxley flows src=66.249.38.99 dst=128.142.55.189 protocol=tcp sport=42035 dport=65498 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 65498,
"protocol": 6,
"streamName": "meraki",
"clientIP": "128.142.55.189",
"serverIP": "66.249.38.99"
} | Create a JSON artifact from the message |
<134>Original Address=128.142.55.189 1 1656855197.442922723 M52_MX67C_Loxley flows src=66.249.38.99 dst=128.142.55.189 protocol=tcp sport=42035 dport=65498 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=128.142.55.189 1 1656855197.442922723 M52_MX67C_Loxley flows src=66.249.38.99 dst=128.142.55.189 protocol=tcp sport=42035 dport=65498 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 42035
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 65498
protocol: 6
streamName: meraki
clientIP: 128.142.55.189
serverIP: 66.249.38.99 | Explain this syslog message |
<134>Original Address=194.161.213.134 1 1656855206.854038643 M52_MX67C_Loxley flows src=77.92.175.186 dst=194.161.213.134 protocol=udp sport=62865 dport=61490 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 61490,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=194.161.213.134 1 1656855206.854038643 M52_MX67C_Loxley flows src=77.92.175.186 dst=194.161.213.134 protocol=udp sport=62865 dport=61490 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 62865,
"protocol": 17,
"streamName": "meraki",
"clientIP": "77.92.175.186",
"serverIP": "194.161.213.134"
} | Create a JSON artifact from the message |
<134>Original Address=194.161.213.134 1 1656855206.854038643 M52_MX67C_Loxley flows src=77.92.175.186 dst=194.161.213.134 protocol=udp sport=62865 dport=61490 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=194.161.213.134 1 1656855206.854038643 M52_MX67C_Loxley flows src=77.92.175.186 dst=194.161.213.134 protocol=udp sport=62865 dport=61490 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 61490
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 62865
protocol: 17
streamName: meraki
clientIP: 77.92.175.186
serverIP: 194.161.213.134 | Explain this syslog message |
<134>Original Address=164.81.193.144 1 1656855206.854038643 M52_MX67C_Loxley flows src=61.183.20.253 dst=164.81.193.144 protocol=udp sport=62865 dport=61490 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 61490,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=164.81.193.144 1 1656855206.854038643 M52_MX67C_Loxley flows src=61.183.20.253 dst=164.81.193.144 protocol=udp sport=62865 dport=61490 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 62865,
"protocol": 17,
"streamName": "meraki",
"clientIP": "61.183.20.253",
"serverIP": "164.81.193.144"
} | Create a JSON artifact from the message |
<134>Original Address=164.81.193.144 1 1656855206.854038643 M52_MX67C_Loxley flows src=61.183.20.253 dst=164.81.193.144 protocol=udp sport=62865 dport=61490 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=164.81.193.144 1 1656855206.854038643 M52_MX67C_Loxley flows src=61.183.20.253 dst=164.81.193.144 protocol=udp sport=62865 dport=61490 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 61490
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 62865
protocol: 17
streamName: meraki
clientIP: 61.183.20.253
serverIP: 164.81.193.144 | Explain this syslog message |
<134>Original Address=136.2.211.91 1 1656855206.854038643 M52_MX67C_Loxley flows src=132.152.18.249 dst=136.2.211.91 protocol=udp sport=62865 dport=61490 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 61490,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=136.2.211.91 1 1656855206.854038643 M52_MX67C_Loxley flows src=132.152.18.249 dst=136.2.211.91 protocol=udp sport=62865 dport=61490 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 62865,
"protocol": 17,
"streamName": "meraki",
"clientIP": "132.152.18.249",
"serverIP": "136.2.211.91"
} | Create a JSON artifact from the message |
<134>Original Address=136.2.211.91 1 1656855206.854038643 M52_MX67C_Loxley flows src=132.152.18.249 dst=136.2.211.91 protocol=udp sport=62865 dport=61490 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=136.2.211.91 1 1656855206.854038643 M52_MX67C_Loxley flows src=132.152.18.249 dst=136.2.211.91 protocol=udp sport=62865 dport=61490 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 61490
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 62865
protocol: 17
streamName: meraki
clientIP: 132.152.18.249
serverIP: 136.2.211.91 | Explain this syslog message |
<134>Original Address=22.248.121.173 1 1656855206.854038643 M52_MX67C_Loxley flows src=9.27.106.195 dst=22.248.121.173 protocol=udp sport=62865 dport=61490 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 61490,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=22.248.121.173 1 1656855206.854038643 M52_MX67C_Loxley flows src=9.27.106.195 dst=22.248.121.173 protocol=udp sport=62865 dport=61490 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 62865,
"protocol": 17,
"streamName": "meraki",
"clientIP": "9.27.106.195",
"serverIP": "22.248.121.173"
} | Create a JSON artifact from the message |
<134>Original Address=22.248.121.173 1 1656855206.854038643 M52_MX67C_Loxley flows src=9.27.106.195 dst=22.248.121.173 protocol=udp sport=62865 dport=61490 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=22.248.121.173 1 1656855206.854038643 M52_MX67C_Loxley flows src=9.27.106.195 dst=22.248.121.173 protocol=udp sport=62865 dport=61490 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 61490
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 62865
protocol: 17
streamName: meraki
clientIP: 9.27.106.195
serverIP: 22.248.121.173 | Explain this syslog message |
<134>Original Address=184.204.248.37 1 1656855206.862697603 M52_MX67C_Loxley flows src=115.143.232.55 dst=184.204.248.37 protocol=udp sport=3544 dport=61490 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 3544,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=184.204.248.37 1 1656855206.862697603 M52_MX67C_Loxley flows src=115.143.232.55 dst=184.204.248.37 protocol=udp sport=3544 dport=61490 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 61490,
"protocol": 17,
"streamName": "meraki",
"clientIP": "184.204.248.37",
"serverIP": "115.143.232.55"
} | Create a JSON artifact from the message |
<134>Original Address=184.204.248.37 1 1656855206.862697603 M52_MX67C_Loxley flows src=115.143.232.55 dst=184.204.248.37 protocol=udp sport=3544 dport=61490 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=184.204.248.37 1 1656855206.862697603 M52_MX67C_Loxley flows src=115.143.232.55 dst=184.204.248.37 protocol=udp sport=3544 dport=61490 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 3544
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 61490
protocol: 17
streamName: meraki
clientIP: 184.204.248.37
serverIP: 115.143.232.55 | Explain this syslog message |
<134>Original Address=38.227.152.244 1 1656855206.862697603 M52_MX67C_Loxley flows src=138.86.47.72 dst=38.227.152.244 protocol=udp sport=3544 dport=61490 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 3544,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=38.227.152.244 1 1656855206.862697603 M52_MX67C_Loxley flows src=138.86.47.72 dst=38.227.152.244 protocol=udp sport=3544 dport=61490 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 61490,
"protocol": 17,
"streamName": "meraki",
"clientIP": "38.227.152.244",
"serverIP": "138.86.47.72"
} | Create a JSON artifact from the message |
<134>Original Address=38.227.152.244 1 1656855206.862697603 M52_MX67C_Loxley flows src=138.86.47.72 dst=38.227.152.244 protocol=udp sport=3544 dport=61490 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=38.227.152.244 1 1656855206.862697603 M52_MX67C_Loxley flows src=138.86.47.72 dst=38.227.152.244 protocol=udp sport=3544 dport=61490 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 3544
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 61490
protocol: 17
streamName: meraki
clientIP: 38.227.152.244
serverIP: 138.86.47.72 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656855207.091545910 NORDC_MX400_1 flows src=142.16.24.76 dst=227.70.138.85 protocol=udp sport=57388 dport=57775 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 57388,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656855207.091545910 NORDC_MX400_1 flows src=142.16.24.76 dst=227.70.138.85 protocol=udp sport=57388 dport=57775 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 57775,
"protocol": 17,
"streamName": "meraki",
"clientIP": "227.70.138.85",
"serverIP": "142.16.24.76"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656855207.091545910 NORDC_MX400_1 flows src=142.16.24.76 dst=227.70.138.85 protocol=udp sport=57388 dport=57775 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656855207.091545910 NORDC_MX400_1 flows src=142.16.24.76 dst=227.70.138.85 protocol=udp sport=57388 dport=57775 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 57388
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 57775
protocol: 17
streamName: meraki
clientIP: 227.70.138.85
serverIP: 142.16.24.76 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1656855207.091545910 NORDC_MX400_1 flows src=84.88.170.23 dst=220.97.44.107 protocol=udp sport=57388 dport=57775 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 57388,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1656855207.091545910 NORDC_MX400_1 flows src=84.88.170.23 dst=220.97.44.107 protocol=udp sport=57388 dport=57775 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 57775,
"protocol": 17,
"streamName": "meraki",
"clientIP": "220.97.44.107",
"serverIP": "84.88.170.23"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1656855207.091545910 NORDC_MX400_1 flows src=84.88.170.23 dst=220.97.44.107 protocol=udp sport=57388 dport=57775 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1656855207.091545910 NORDC_MX400_1 flows src=84.88.170.23 dst=220.97.44.107 protocol=udp sport=57388 dport=57775 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 57388
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 57775
protocol: 17
streamName: meraki
clientIP: 220.97.44.107
serverIP: 84.88.170.23 | Explain this syslog message |
<134>Original Address=62.254.184.16 1 1656855217.049218243 M52_MX67C_Loxley flows src=179.231.35.58 dst=62.254.184.16 protocol=tcp sport=17611 dport=23 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 23,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=62.254.184.16 1 1656855217.049218243 M52_MX67C_Loxley flows src=179.231.35.58 dst=62.254.184.16 protocol=tcp sport=17611 dport=23 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 17611,
"protocol": 6,
"streamName": "meraki",
"clientIP": "179.231.35.58",
"serverIP": "62.254.184.16"
} | Create a JSON artifact from the message |
<134>Original Address=62.254.184.16 1 1656855217.049218243 M52_MX67C_Loxley flows src=179.231.35.58 dst=62.254.184.16 protocol=tcp sport=17611 dport=23 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=62.254.184.16 1 1656855217.049218243 M52_MX67C_Loxley flows src=179.231.35.58 dst=62.254.184.16 protocol=tcp sport=17611 dport=23 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 23
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 17611
protocol: 6
streamName: meraki
clientIP: 179.231.35.58
serverIP: 62.254.184.16 | Explain this syslog message |
<134>Original Address=243.149.179.86 1 1656855217.049218243 M52_MX67C_Loxley flows src=132.192.37.51 dst=243.149.179.86 protocol=tcp sport=17611 dport=23 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 23,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=243.149.179.86 1 1656855217.049218243 M52_MX67C_Loxley flows src=132.192.37.51 dst=243.149.179.86 protocol=tcp sport=17611 dport=23 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 17611,
"protocol": 6,
"streamName": "meraki",
"clientIP": "132.192.37.51",
"serverIP": "243.149.179.86"
} | Create a JSON artifact from the message |
<134>Original Address=243.149.179.86 1 1656855217.049218243 M52_MX67C_Loxley flows src=132.192.37.51 dst=243.149.179.86 protocol=tcp sport=17611 dport=23 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=243.149.179.86 1 1656855217.049218243 M52_MX67C_Loxley flows src=132.192.37.51 dst=243.149.179.86 protocol=tcp sport=17611 dport=23 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 23
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 17611
protocol: 6
streamName: meraki
clientIP: 132.192.37.51
serverIP: 243.149.179.86 | Explain this syslog message |
<134>Original Address=144.134.35.8 1 1656855217.049218243 M52_MX67C_Loxley flows src=42.168.100.223 dst=144.134.35.8 protocol=tcp sport=17611 dport=23 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 23,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=144.134.35.8 1 1656855217.049218243 M52_MX67C_Loxley flows src=42.168.100.223 dst=144.134.35.8 protocol=tcp sport=17611 dport=23 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 17611,
"protocol": 6,
"streamName": "meraki",
"clientIP": "42.168.100.223",
"serverIP": "144.134.35.8"
} | Create a JSON artifact from the message |
<134>Original Address=144.134.35.8 1 1656855217.049218243 M52_MX67C_Loxley flows src=42.168.100.223 dst=144.134.35.8 protocol=tcp sport=17611 dport=23 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=144.134.35.8 1 1656855217.049218243 M52_MX67C_Loxley flows src=42.168.100.223 dst=144.134.35.8 protocol=tcp sport=17611 dport=23 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 23
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 17611
protocol: 6
streamName: meraki
clientIP: 42.168.100.223
serverIP: 144.134.35.8 | Explain this syslog message |
<134>Original Address=79.169.121.101 1 1656855217.049218243 M52_MX67C_Loxley flows src=55.215.234.204 dst=79.169.121.101 protocol=tcp sport=17611 dport=23 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 23,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=79.169.121.101 1 1656855217.049218243 M52_MX67C_Loxley flows src=55.215.234.204 dst=79.169.121.101 protocol=tcp sport=17611 dport=23 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 17611,
"protocol": 6,
"streamName": "meraki",
"clientIP": "55.215.234.204",
"serverIP": "79.169.121.101"
} | Create a JSON artifact from the message |
<134>Original Address=79.169.121.101 1 1656855217.049218243 M52_MX67C_Loxley flows src=55.215.234.204 dst=79.169.121.101 protocol=tcp sport=17611 dport=23 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=79.169.121.101 1 1656855217.049218243 M52_MX67C_Loxley flows src=55.215.234.204 dst=79.169.121.101 protocol=tcp sport=17611 dport=23 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 23
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 17611
protocol: 6
streamName: meraki
clientIP: 55.215.234.204
serverIP: 79.169.121.101 | Explain this syslog message |
<134>Original Address=254.189.76.172 1 1656855219.215958603 M52_MX67C_Loxley flows src=216.204.119.60 dst=254.189.76.172 protocol=tcp sport=443 dport=49837 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=254.189.76.172 1 1656855219.215958603 M52_MX67C_Loxley flows src=216.204.119.60 dst=254.189.76.172 protocol=tcp sport=443 dport=49837 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 49837,
"protocol": 6,
"streamName": "meraki",
"clientIP": "254.189.76.172",
"serverIP": "216.204.119.60"
} | Create a JSON artifact from the message |
<134>Original Address=254.189.76.172 1 1656855219.215958603 M52_MX67C_Loxley flows src=216.204.119.60 dst=254.189.76.172 protocol=tcp sport=443 dport=49837 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=254.189.76.172 1 1656855219.215958603 M52_MX67C_Loxley flows src=216.204.119.60 dst=254.189.76.172 protocol=tcp sport=443 dport=49837 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 443
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 49837
protocol: 6
streamName: meraki
clientIP: 254.189.76.172
serverIP: 216.204.119.60 | Explain this syslog message |
<134>Original Address=150.22.247.78 1 1656855219.215958603 M52_MX67C_Loxley flows src=241.159.197.235 dst=150.22.247.78 protocol=tcp sport=443 dport=49837 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=150.22.247.78 1 1656855219.215958603 M52_MX67C_Loxley flows src=241.159.197.235 dst=150.22.247.78 protocol=tcp sport=443 dport=49837 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 49837,
"protocol": 6,
"streamName": "meraki",
"clientIP": "150.22.247.78",
"serverIP": "241.159.197.235"
} | Create a JSON artifact from the message |
<134>Original Address=150.22.247.78 1 1656855219.215958603 M52_MX67C_Loxley flows src=241.159.197.235 dst=150.22.247.78 protocol=tcp sport=443 dport=49837 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=150.22.247.78 1 1656855219.215958603 M52_MX67C_Loxley flows src=241.159.197.235 dst=150.22.247.78 protocol=tcp sport=443 dport=49837 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 443
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 49837
protocol: 6
streamName: meraki
clientIP: 150.22.247.78
serverIP: 241.159.197.235 | Explain this syslog message |
<134>Original Address=199.211.249.174 1 1656855219.215958603 M52_MX67C_Loxley flows src=97.252.47.184 dst=199.211.249.174 protocol=tcp sport=443 dport=49837 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=199.211.249.174 1 1656855219.215958603 M52_MX67C_Loxley flows src=97.252.47.184 dst=199.211.249.174 protocol=tcp sport=443 dport=49837 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 49837,
"protocol": 6,
"streamName": "meraki",
"clientIP": "199.211.249.174",
"serverIP": "97.252.47.184"
} | Create a JSON artifact from the message |
<134>Original Address=199.211.249.174 1 1656855219.215958603 M52_MX67C_Loxley flows src=97.252.47.184 dst=199.211.249.174 protocol=tcp sport=443 dport=49837 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=199.211.249.174 1 1656855219.215958603 M52_MX67C_Loxley flows src=97.252.47.184 dst=199.211.249.174 protocol=tcp sport=443 dport=49837 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 443
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 49837
protocol: 6
streamName: meraki
clientIP: 199.211.249.174
serverIP: 97.252.47.184 | Explain this syslog message |
<134>Original Address=243.141.148.129 1 1656855219.215958603 M52_MX67C_Loxley flows src=64.204.32.69 dst=243.141.148.129 protocol=tcp sport=443 dport=49837 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=243.141.148.129 1 1656855219.215958603 M52_MX67C_Loxley flows src=64.204.32.69 dst=243.141.148.129 protocol=tcp sport=443 dport=49837 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 49837,
"protocol": 6,
"streamName": "meraki",
"clientIP": "243.141.148.129",
"serverIP": "64.204.32.69"
} | Create a JSON artifact from the message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.