input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<164>Dec 24 2022 08:05:59: %ASA-4-106023: Deny tcp src outside:20.88.42.154/52996 dst dmz-1:254.78.112.197/52088 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 52088, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Dec 24 2022 08:05:59: %ASA-4-106023: Deny tcp src outside:20.88.42.154/52996 dst dmz-1:254.78.112.197/52088 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 52996, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "20.88.42.154", "serverIP": "254.78.112.197" }
Create a JSON artifact from the message
<164>Dec 24 2022 08:05:59: %ASA-4-106023: Deny tcp src outside:20.88.42.154/52996 dst dmz-1:254.78.112.197/52088 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Dec 24 2022 08:05:59: %ASA-4-106023: Deny tcp src outside:20.88.42.154/52996 dst dmz-1:254.78.112.197/52088 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 52088 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 52996 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 20.88.42.154 serverIP: 254.78.112.197
Explain this syslog message
<164>Dec 24 2022 08:05:59: %ASA-4-106023: Deny tcp src outside:74.217.53.111/52996 dst dmz-1:11.237.138.80/52088 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 52088, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Dec 24 2022 08:05:59: %ASA-4-106023: Deny tcp src outside:74.217.53.111/52996 dst dmz-1:11.237.138.80/52088 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 52996, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "74.217.53.111", "serverIP": "11.237.138.80" }
Create a JSON artifact from the message
<164>Dec 24 2022 08:05:59: %ASA-4-106023: Deny tcp src outside:74.217.53.111/52996 dst dmz-1:11.237.138.80/52088 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Dec 24 2022 08:05:59: %ASA-4-106023: Deny tcp src outside:74.217.53.111/52996 dst dmz-1:11.237.138.80/52088 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 52088 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 52996 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 74.217.53.111 serverIP: 11.237.138.80
Explain this syslog message
<164>Dec 24 2022 08:06:09: %ASA-4-106023: Deny tcp src outside:170.51.35.152/39558 dst dmz-1:201.45.31.39/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Dec 24 2022 08:06:09: %ASA-4-106023: Deny tcp src outside:170.51.35.152/39558 dst dmz-1:201.45.31.39/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 39558, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "170.51.35.152", "serverIP": "201.45.31.39" }
Create a JSON artifact from the message
<164>Dec 24 2022 08:06:09: %ASA-4-106023: Deny tcp src outside:170.51.35.152/39558 dst dmz-1:201.45.31.39/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Dec 24 2022 08:06:09: %ASA-4-106023: Deny tcp src outside:170.51.35.152/39558 dst dmz-1:201.45.31.39/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 39558 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 170.51.35.152 serverIP: 201.45.31.39
Explain this syslog message
<164>Dec 24 2022 08:06:09: %ASA-4-106023: Deny tcp src outside:153.153.55.229/39558 dst dmz-1:66.120.192.207/23 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 23, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Dec 24 2022 08:06:09: %ASA-4-106023: Deny tcp src outside:153.153.55.229/39558 dst dmz-1:66.120.192.207/23 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 39558, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 6, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "153.153.55.229", "serverIP": "66.120.192.207" }
Create a JSON artifact from the message
<164>Dec 24 2022 08:06:09: %ASA-4-106023: Deny tcp src outside:153.153.55.229/39558 dst dmz-1:66.120.192.207/23 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Dec 24 2022 08:06:09: %ASA-4-106023: Deny tcp src outside:153.153.55.229/39558 dst dmz-1:66.120.192.207/23 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 23 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 39558 vendorcode: ASA-4-106023 action: block protocol: 6 facilitycode: 20 streamName: cisco_asa clientIP: 153.153.55.229 serverIP: 66.120.192.207
Explain this syslog message
<134>Original Address=205.170.169.42 1 1658399570.782680764 M58_MX67_FtWalton flows src=36.202.77.154 dst=6.138.105.220 protocol=tcp sport=50776 dport=3481 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 3481, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=205.170.169.42 1 1658399570.782680764 M58_MX67_FtWalton flows src=36.202.77.154 dst=6.138.105.220 protocol=tcp sport=50776 dport=3481 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 50776, "protocol": 6, "streamName": "meraki", "clientIP": "36.202.77.154", "serverIP": "6.138.105.220" }
Create a JSON artifact from the message
<134>Original Address=205.170.169.42 1 1658399570.782680764 M58_MX67_FtWalton flows src=36.202.77.154 dst=6.138.105.220 protocol=tcp sport=50776 dport=3481 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=205.170.169.42 1 1658399570.782680764 M58_MX67_FtWalton flows src=36.202.77.154 dst=6.138.105.220 protocol=tcp sport=50776 dport=3481 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 3481 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 50776 protocol: 6 streamName: meraki clientIP: 36.202.77.154 serverIP: 6.138.105.220
Explain this syslog message
<134>Original Address=205.170.169.42 1 1658399570.782680764 M58_MX67_FtWalton flows src=15.140.180.238 dst=90.19.141.204 protocol=tcp sport=50776 dport=3481 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 3481, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=205.170.169.42 1 1658399570.782680764 M58_MX67_FtWalton flows src=15.140.180.238 dst=90.19.141.204 protocol=tcp sport=50776 dport=3481 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 50776, "protocol": 6, "streamName": "meraki", "clientIP": "15.140.180.238", "serverIP": "90.19.141.204" }
Create a JSON artifact from the message
<134>Original Address=205.170.169.42 1 1658399570.782680764 M58_MX67_FtWalton flows src=15.140.180.238 dst=90.19.141.204 protocol=tcp sport=50776 dport=3481 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=205.170.169.42 1 1658399570.782680764 M58_MX67_FtWalton flows src=15.140.180.238 dst=90.19.141.204 protocol=tcp sport=50776 dport=3481 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 3481 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 50776 protocol: 6 streamName: meraki clientIP: 15.140.180.238 serverIP: 90.19.141.204
Explain this syslog message
<134>Original Address=205.170.169.42 1 1658399570.782680764 M58_MX67_FtWalton flows src=107.252.167.249 dst=215.146.241.253 protocol=tcp sport=50776 dport=3481 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 3481, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=205.170.169.42 1 1658399570.782680764 M58_MX67_FtWalton flows src=107.252.167.249 dst=215.146.241.253 protocol=tcp sport=50776 dport=3481 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 50776, "protocol": 6, "streamName": "meraki", "clientIP": "107.252.167.249", "serverIP": "215.146.241.253" }
Create a JSON artifact from the message
<134>Original Address=205.170.169.42 1 1658399570.782680764 M58_MX67_FtWalton flows src=107.252.167.249 dst=215.146.241.253 protocol=tcp sport=50776 dport=3481 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=205.170.169.42 1 1658399570.782680764 M58_MX67_FtWalton flows src=107.252.167.249 dst=215.146.241.253 protocol=tcp sport=50776 dport=3481 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 3481 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 50776 protocol: 6 streamName: meraki clientIP: 107.252.167.249 serverIP: 215.146.241.253
Explain this syslog message
<134>Original Address=205.170.169.42 1 1658399570.782680764 M58_MX67_FtWalton flows src=129.50.121.55 dst=13.62.110.150 protocol=tcp sport=50776 dport=3481 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 3481, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=205.170.169.42 1 1658399570.782680764 M58_MX67_FtWalton flows src=129.50.121.55 dst=13.62.110.150 protocol=tcp sport=50776 dport=3481 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 50776, "protocol": 6, "streamName": "meraki", "clientIP": "129.50.121.55", "serverIP": "13.62.110.150" }
Create a JSON artifact from the message
<134>Original Address=205.170.169.42 1 1658399570.782680764 M58_MX67_FtWalton flows src=129.50.121.55 dst=13.62.110.150 protocol=tcp sport=50776 dport=3481 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=205.170.169.42 1 1658399570.782680764 M58_MX67_FtWalton flows src=129.50.121.55 dst=13.62.110.150 protocol=tcp sport=50776 dport=3481 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 3481 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 50776 protocol: 6 streamName: meraki clientIP: 129.50.121.55 serverIP: 13.62.110.150
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660672646.037833967 NORDC_MX400_1 flows src=236.200.249.179 dst=85.11.91.201 protocol=tcp sport=3375 dport=25 pattern: 1 dst 85.11.91.201
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660672646.037833967 NORDC_MX400_1 flows src=236.200.249.179 dst=85.11.91.201 protocol=tcp sport=3375 dport=25 pattern: 1 dst 85.11.91.201", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 3375, "protocol": 6, "streamName": "meraki", "clientIP": "236.200.249.179", "serverIP": "85.11.91.201" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660672646.037833967 NORDC_MX400_1 flows src=236.200.249.179 dst=85.11.91.201 protocol=tcp sport=3375 dport=25 pattern: 1 dst 85.11.91.201
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660672646.037833967 NORDC_MX400_1 flows src=236.200.249.179 dst=85.11.91.201 protocol=tcp sport=3375 dport=25 pattern: 1 dst 85.11.91.201
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 3375 protocol: 6 streamName: meraki clientIP: 236.200.249.179 serverIP: 85.11.91.201
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660672646.037833967 NORDC_MX400_1 flows src=41.46.99.179 dst=86.116.212.62 protocol=tcp sport=3375 dport=25 pattern: 1 dst 86.116.212.62
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660672646.037833967 NORDC_MX400_1 flows src=41.46.99.179 dst=86.116.212.62 protocol=tcp sport=3375 dport=25 pattern: 1 dst 86.116.212.62", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 3375, "protocol": 6, "streamName": "meraki", "clientIP": "41.46.99.179", "serverIP": "86.116.212.62" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660672646.037833967 NORDC_MX400_1 flows src=41.46.99.179 dst=86.116.212.62 protocol=tcp sport=3375 dport=25 pattern: 1 dst 86.116.212.62
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660672646.037833967 NORDC_MX400_1 flows src=41.46.99.179 dst=86.116.212.62 protocol=tcp sport=3375 dport=25 pattern: 1 dst 86.116.212.62
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 3375 protocol: 6 streamName: meraki clientIP: 41.46.99.179 serverIP: 86.116.212.62
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660672645.796258285 NORDC_MX400_1 flows src=159.78.228.44 dst=186.174.56.208 protocol=udp sport=4104 dport=4104 pattern: 1 dst 186.174.56.208
{ "senderhost": "192.168.2.250", "serverport": 4104, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660672645.796258285 NORDC_MX400_1 flows src=159.78.228.44 dst=186.174.56.208 protocol=udp sport=4104 dport=4104 pattern: 1 dst 186.174.56.208", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 4104, "protocol": 17, "streamName": "meraki", "clientIP": "186.174.56.208", "serverIP": "159.78.228.44" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660672645.796258285 NORDC_MX400_1 flows src=159.78.228.44 dst=186.174.56.208 protocol=udp sport=4104 dport=4104 pattern: 1 dst 186.174.56.208
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660672645.796258285 NORDC_MX400_1 flows src=159.78.228.44 dst=186.174.56.208 protocol=udp sport=4104 dport=4104 pattern: 1 dst 186.174.56.208
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 4104 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 4104 protocol: 17 streamName: meraki clientIP: 186.174.56.208 serverIP: 159.78.228.44
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660672645.796258285 NORDC_MX400_1 flows src=72.167.66.8 dst=119.145.23.60 protocol=udp sport=4104 dport=4104 pattern: 1 dst 119.145.23.60
{ "senderhost": "192.168.2.250", "serverport": 4104, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660672645.796258285 NORDC_MX400_1 flows src=72.167.66.8 dst=119.145.23.60 protocol=udp sport=4104 dport=4104 pattern: 1 dst 119.145.23.60", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 4104, "protocol": 17, "streamName": "meraki", "clientIP": "119.145.23.60", "serverIP": "72.167.66.8" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660672645.796258285 NORDC_MX400_1 flows src=72.167.66.8 dst=119.145.23.60 protocol=udp sport=4104 dport=4104 pattern: 1 dst 119.145.23.60
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660672645.796258285 NORDC_MX400_1 flows src=72.167.66.8 dst=119.145.23.60 protocol=udp sport=4104 dport=4104 pattern: 1 dst 119.145.23.60
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 4104 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 4104 protocol: 17 streamName: meraki clientIP: 119.145.23.60 serverIP: 72.167.66.8
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660672645.801585752 NORDC_MX400_1 flows src=82.46.203.141 dst=146.75.9.254 protocol=tcp sport=17825 dport=25 pattern: 1 dst 146.75.9.254
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660672645.801585752 NORDC_MX400_1 flows src=82.46.203.141 dst=146.75.9.254 protocol=tcp sport=17825 dport=25 pattern: 1 dst 146.75.9.254", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 17825, "protocol": 6, "streamName": "meraki", "clientIP": "82.46.203.141", "serverIP": "146.75.9.254" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660672645.801585752 NORDC_MX400_1 flows src=82.46.203.141 dst=146.75.9.254 protocol=tcp sport=17825 dport=25 pattern: 1 dst 146.75.9.254
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660672645.801585752 NORDC_MX400_1 flows src=82.46.203.141 dst=146.75.9.254 protocol=tcp sport=17825 dport=25 pattern: 1 dst 146.75.9.254
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 17825 protocol: 6 streamName: meraki clientIP: 82.46.203.141 serverIP: 146.75.9.254
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660672645.801585752 NORDC_MX400_1 flows src=238.43.47.243 dst=210.155.87.93 protocol=tcp sport=17825 dport=25 pattern: 1 dst 210.155.87.93
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660672645.801585752 NORDC_MX400_1 flows src=238.43.47.243 dst=210.155.87.93 protocol=tcp sport=17825 dport=25 pattern: 1 dst 210.155.87.93", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 17825, "protocol": 6, "streamName": "meraki", "clientIP": "238.43.47.243", "serverIP": "210.155.87.93" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660672645.801585752 NORDC_MX400_1 flows src=238.43.47.243 dst=210.155.87.93 protocol=tcp sport=17825 dport=25 pattern: 1 dst 210.155.87.93
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660672645.801585752 NORDC_MX400_1 flows src=238.43.47.243 dst=210.155.87.93 protocol=tcp sport=17825 dport=25 pattern: 1 dst 210.155.87.93
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 17825 protocol: 6 streamName: meraki clientIP: 238.43.47.243 serverIP: 210.155.87.93
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660672645.783448957 NORDC_MX400_1 flows src=158.171.127.133 dst=228.134.97.158 protocol=tcp sport=26632 dport=25 pattern: 1 dst 228.134.97.158
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660672645.783448957 NORDC_MX400_1 flows src=158.171.127.133 dst=228.134.97.158 protocol=tcp sport=26632 dport=25 pattern: 1 dst 228.134.97.158", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 26632, "protocol": 6, "streamName": "meraki", "clientIP": "158.171.127.133", "serverIP": "228.134.97.158" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660672645.783448957 NORDC_MX400_1 flows src=158.171.127.133 dst=228.134.97.158 protocol=tcp sport=26632 dport=25 pattern: 1 dst 228.134.97.158
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660672645.783448957 NORDC_MX400_1 flows src=158.171.127.133 dst=228.134.97.158 protocol=tcp sport=26632 dport=25 pattern: 1 dst 228.134.97.158
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 26632 protocol: 6 streamName: meraki clientIP: 158.171.127.133 serverIP: 228.134.97.158
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660672645.783448957 NORDC_MX400_1 flows src=86.16.129.72 dst=34.133.72.8 protocol=tcp sport=26632 dport=25 pattern: 1 dst 34.133.72.8
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660672645.783448957 NORDC_MX400_1 flows src=86.16.129.72 dst=34.133.72.8 protocol=tcp sport=26632 dport=25 pattern: 1 dst 34.133.72.8", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 26632, "protocol": 6, "streamName": "meraki", "clientIP": "86.16.129.72", "serverIP": "34.133.72.8" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660672645.783448957 NORDC_MX400_1 flows src=86.16.129.72 dst=34.133.72.8 protocol=tcp sport=26632 dport=25 pattern: 1 dst 34.133.72.8
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660672645.783448957 NORDC_MX400_1 flows src=86.16.129.72 dst=34.133.72.8 protocol=tcp sport=26632 dport=25 pattern: 1 dst 34.133.72.8
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 26632 protocol: 6 streamName: meraki clientIP: 86.16.129.72 serverIP: 34.133.72.8
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660672646.127594832 NORDC_MX400_1 flows src=134.26.244.105 dst=140.93.218.37 protocol=tcp sport=6617 dport=25 pattern: 1 dst 140.93.218.37
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660672646.127594832 NORDC_MX400_1 flows src=134.26.244.105 dst=140.93.218.37 protocol=tcp sport=6617 dport=25 pattern: 1 dst 140.93.218.37", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 6617, "protocol": 6, "streamName": "meraki", "clientIP": "134.26.244.105", "serverIP": "140.93.218.37" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660672646.127594832 NORDC_MX400_1 flows src=134.26.244.105 dst=140.93.218.37 protocol=tcp sport=6617 dport=25 pattern: 1 dst 140.93.218.37
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660672646.127594832 NORDC_MX400_1 flows src=134.26.244.105 dst=140.93.218.37 protocol=tcp sport=6617 dport=25 pattern: 1 dst 140.93.218.37
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 6617 protocol: 6 streamName: meraki clientIP: 134.26.244.105 serverIP: 140.93.218.37
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660672646.127594832 NORDC_MX400_1 flows src=98.65.103.27 dst=15.117.214.72 protocol=tcp sport=6617 dport=25 pattern: 1 dst 15.117.214.72
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660672646.127594832 NORDC_MX400_1 flows src=98.65.103.27 dst=15.117.214.72 protocol=tcp sport=6617 dport=25 pattern: 1 dst 15.117.214.72", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 6617, "protocol": 6, "streamName": "meraki", "clientIP": "98.65.103.27", "serverIP": "15.117.214.72" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660672646.127594832 NORDC_MX400_1 flows src=98.65.103.27 dst=15.117.214.72 protocol=tcp sport=6617 dport=25 pattern: 1 dst 15.117.214.72
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660672646.127594832 NORDC_MX400_1 flows src=98.65.103.27 dst=15.117.214.72 protocol=tcp sport=6617 dport=25 pattern: 1 dst 15.117.214.72
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 6617 protocol: 6 streamName: meraki clientIP: 98.65.103.27 serverIP: 15.117.214.72
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660672646.591026112 NORDC_MX400_1 flows src=238.59.253.192 dst=131.192.140.78 protocol=tcp sport=6306 dport=25 pattern: 1 dst 131.192.140.78
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660672646.591026112 NORDC_MX400_1 flows src=238.59.253.192 dst=131.192.140.78 protocol=tcp sport=6306 dport=25 pattern: 1 dst 131.192.140.78", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 6306, "protocol": 6, "streamName": "meraki", "clientIP": "238.59.253.192", "serverIP": "131.192.140.78" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660672646.591026112 NORDC_MX400_1 flows src=238.59.253.192 dst=131.192.140.78 protocol=tcp sport=6306 dport=25 pattern: 1 dst 131.192.140.78
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660672646.591026112 NORDC_MX400_1 flows src=238.59.253.192 dst=131.192.140.78 protocol=tcp sport=6306 dport=25 pattern: 1 dst 131.192.140.78
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 6306 protocol: 6 streamName: meraki clientIP: 238.59.253.192 serverIP: 131.192.140.78
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660672646.591026112 NORDC_MX400_1 flows src=251.221.37.62 dst=183.9.58.238 protocol=tcp sport=6306 dport=25 pattern: 1 dst 183.9.58.238
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660672646.591026112 NORDC_MX400_1 flows src=251.221.37.62 dst=183.9.58.238 protocol=tcp sport=6306 dport=25 pattern: 1 dst 183.9.58.238", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 6306, "protocol": 6, "streamName": "meraki", "clientIP": "251.221.37.62", "serverIP": "183.9.58.238" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660672646.591026112 NORDC_MX400_1 flows src=251.221.37.62 dst=183.9.58.238 protocol=tcp sport=6306 dport=25 pattern: 1 dst 183.9.58.238
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660672646.591026112 NORDC_MX400_1 flows src=251.221.37.62 dst=183.9.58.238 protocol=tcp sport=6306 dport=25 pattern: 1 dst 183.9.58.238
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 6306 protocol: 6 streamName: meraki clientIP: 251.221.37.62 serverIP: 183.9.58.238
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660672646.037833967 NORDC_MX400_1 flows src=64.148.42.143 dst=103.146.234.14 protocol=tcp sport=3375 dport=25 pattern: 1 dst 103.146.234.14
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660672646.037833967 NORDC_MX400_1 flows src=64.148.42.143 dst=103.146.234.14 protocol=tcp sport=3375 dport=25 pattern: 1 dst 103.146.234.14", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 3375, "protocol": 6, "streamName": "meraki", "clientIP": "64.148.42.143", "serverIP": "103.146.234.14" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660672646.037833967 NORDC_MX400_1 flows src=64.148.42.143 dst=103.146.234.14 protocol=tcp sport=3375 dport=25 pattern: 1 dst 103.146.234.14
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660672646.037833967 NORDC_MX400_1 flows src=64.148.42.143 dst=103.146.234.14 protocol=tcp sport=3375 dport=25 pattern: 1 dst 103.146.234.14
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 3375 protocol: 6 streamName: meraki clientIP: 64.148.42.143 serverIP: 103.146.234.14
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660672646.037833967 NORDC_MX400_1 flows src=55.106.228.75 dst=61.49.28.186 protocol=tcp sport=3375 dport=25 pattern: 1 dst 61.49.28.186
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660672646.037833967 NORDC_MX400_1 flows src=55.106.228.75 dst=61.49.28.186 protocol=tcp sport=3375 dport=25 pattern: 1 dst 61.49.28.186", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 3375, "protocol": 6, "streamName": "meraki", "clientIP": "55.106.228.75", "serverIP": "61.49.28.186" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660672646.037833967 NORDC_MX400_1 flows src=55.106.228.75 dst=61.49.28.186 protocol=tcp sport=3375 dport=25 pattern: 1 dst 61.49.28.186
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660672646.037833967 NORDC_MX400_1 flows src=55.106.228.75 dst=61.49.28.186 protocol=tcp sport=3375 dport=25 pattern: 1 dst 61.49.28.186
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 3375 protocol: 6 streamName: meraki clientIP: 55.106.228.75 serverIP: 61.49.28.186
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660672646.178601375 NORDC_MX400_1 flows src=116.67.136.99 dst=87.69.221.250 protocol=tcp sport=33353 dport=25 pattern: 1 dst 87.69.221.250
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660672646.178601375 NORDC_MX400_1 flows src=116.67.136.99 dst=87.69.221.250 protocol=tcp sport=33353 dport=25 pattern: 1 dst 87.69.221.250", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 33353, "protocol": 6, "streamName": "meraki", "clientIP": "116.67.136.99", "serverIP": "87.69.221.250" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660672646.178601375 NORDC_MX400_1 flows src=116.67.136.99 dst=87.69.221.250 protocol=tcp sport=33353 dport=25 pattern: 1 dst 87.69.221.250
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660672646.178601375 NORDC_MX400_1 flows src=116.67.136.99 dst=87.69.221.250 protocol=tcp sport=33353 dport=25 pattern: 1 dst 87.69.221.250
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 33353 protocol: 6 streamName: meraki clientIP: 116.67.136.99 serverIP: 87.69.221.250
Explain this syslog message
<134>Original Address=192.168.2.253 1 1660672646.178601375 NORDC_MX400_1 flows src=9.148.223.48 dst=18.140.245.251 protocol=tcp sport=33353 dport=25 pattern: 1 dst 18.140.245.251
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1660672646.178601375 NORDC_MX400_1 flows src=9.148.223.48 dst=18.140.245.251 protocol=tcp sport=33353 dport=25 pattern: 1 dst 18.140.245.251", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 33353, "protocol": 6, "streamName": "meraki", "clientIP": "9.148.223.48", "serverIP": "18.140.245.251" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1660672646.178601375 NORDC_MX400_1 flows src=9.148.223.48 dst=18.140.245.251 protocol=tcp sport=33353 dport=25 pattern: 1 dst 18.140.245.251
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1660672646.178601375 NORDC_MX400_1 flows src=9.148.223.48 dst=18.140.245.251 protocol=tcp sport=33353 dport=25 pattern: 1 dst 18.140.245.251
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 33353 protocol: 6 streamName: meraki clientIP: 9.148.223.48 serverIP: 18.140.245.251
Explain this syslog message
<134>Original Address=24.216.133.2 1 1670186224.605917277 M36_MX67C_Athens flows src=230.29.69.91 dst=160.55.68.229 protocol=tcp sport=61953 dport=8018 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 8018, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=24.216.133.2 1 1670186224.605917277 M36_MX67C_Athens flows src=230.29.69.91 dst=160.55.68.229 protocol=tcp sport=61953 dport=8018 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 61953, "protocol": 6, "streamName": "meraki", "clientIP": "230.29.69.91", "serverIP": "160.55.68.229" }
Create a JSON artifact from the message
<134>Original Address=24.216.133.2 1 1670186224.605917277 M36_MX67C_Athens flows src=230.29.69.91 dst=160.55.68.229 protocol=tcp sport=61953 dport=8018 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=24.216.133.2 1 1670186224.605917277 M36_MX67C_Athens flows src=230.29.69.91 dst=160.55.68.229 protocol=tcp sport=61953 dport=8018 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 8018 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 61953 protocol: 6 streamName: meraki clientIP: 230.29.69.91 serverIP: 160.55.68.229
Explain this syslog message
<134>Original Address=24.216.133.2 1 1670186224.605917277 M36_MX67C_Athens flows src=205.62.39.250 dst=216.254.143.29 protocol=tcp sport=61953 dport=8018 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 8018, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=24.216.133.2 1 1670186224.605917277 M36_MX67C_Athens flows src=205.62.39.250 dst=216.254.143.29 protocol=tcp sport=61953 dport=8018 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 61953, "protocol": 6, "streamName": "meraki", "clientIP": "205.62.39.250", "serverIP": "216.254.143.29" }
Create a JSON artifact from the message
<134>Original Address=24.216.133.2 1 1670186224.605917277 M36_MX67C_Athens flows src=205.62.39.250 dst=216.254.143.29 protocol=tcp sport=61953 dport=8018 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=24.216.133.2 1 1670186224.605917277 M36_MX67C_Athens flows src=205.62.39.250 dst=216.254.143.29 protocol=tcp sport=61953 dport=8018 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 8018 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 61953 protocol: 6 streamName: meraki clientIP: 205.62.39.250 serverIP: 216.254.143.29
Explain this syslog message
<134>Original Address=24.216.133.2 1 1670186224.605917277 M36_MX67C_Athens flows src=38.71.7.161 dst=9.225.100.233 protocol=tcp sport=61953 dport=8018 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 8018, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=24.216.133.2 1 1670186224.605917277 M36_MX67C_Athens flows src=38.71.7.161 dst=9.225.100.233 protocol=tcp sport=61953 dport=8018 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 61953, "protocol": 6, "streamName": "meraki", "clientIP": "38.71.7.161", "serverIP": "9.225.100.233" }
Create a JSON artifact from the message
<134>Original Address=24.216.133.2 1 1670186224.605917277 M36_MX67C_Athens flows src=38.71.7.161 dst=9.225.100.233 protocol=tcp sport=61953 dport=8018 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=24.216.133.2 1 1670186224.605917277 M36_MX67C_Athens flows src=38.71.7.161 dst=9.225.100.233 protocol=tcp sport=61953 dport=8018 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 8018 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 61953 protocol: 6 streamName: meraki clientIP: 38.71.7.161 serverIP: 9.225.100.233
Explain this syslog message
<134>Original Address=24.216.133.2 1 1670186224.605917277 M36_MX67C_Athens flows src=182.206.96.77 dst=236.105.103.251 protocol=tcp sport=61953 dport=8018 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 8018, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=24.216.133.2 1 1670186224.605917277 M36_MX67C_Athens flows src=182.206.96.77 dst=236.105.103.251 protocol=tcp sport=61953 dport=8018 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 61953, "protocol": 6, "streamName": "meraki", "clientIP": "182.206.96.77", "serverIP": "236.105.103.251" }
Create a JSON artifact from the message
<134>Original Address=24.216.133.2 1 1670186224.605917277 M36_MX67C_Athens flows src=182.206.96.77 dst=236.105.103.251 protocol=tcp sport=61953 dport=8018 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=24.216.133.2 1 1670186224.605917277 M36_MX67C_Athens flows src=182.206.96.77 dst=236.105.103.251 protocol=tcp sport=61953 dport=8018 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 8018 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 61953 protocol: 6 streamName: meraki clientIP: 182.206.96.77 serverIP: 236.105.103.251
Explain this syslog message
<134>Original Address=225.238.183.8 1 1670188933.152031555 M86_MX67C_Anniston flows src=188.67.71.92 dst=225.238.183.8 protocol=tcp sport=27150 dport=23 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 23, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=225.238.183.8 1 1670188933.152031555 M86_MX67C_Anniston flows src=188.67.71.92 dst=225.238.183.8 protocol=tcp sport=27150 dport=23 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 27150, "protocol": 6, "streamName": "meraki", "clientIP": "188.67.71.92", "serverIP": "225.238.183.8" }
Create a JSON artifact from the message
<134>Original Address=225.238.183.8 1 1670188933.152031555 M86_MX67C_Anniston flows src=188.67.71.92 dst=225.238.183.8 protocol=tcp sport=27150 dport=23 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=225.238.183.8 1 1670188933.152031555 M86_MX67C_Anniston flows src=188.67.71.92 dst=225.238.183.8 protocol=tcp sport=27150 dport=23 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 23 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 27150 protocol: 6 streamName: meraki clientIP: 188.67.71.92 serverIP: 225.238.183.8
Explain this syslog message
<134>Original Address=101.25.132.114 1 1670188933.152031555 M86_MX67C_Anniston flows src=188.205.209.19 dst=101.25.132.114 protocol=tcp sport=27150 dport=23 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 23, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=101.25.132.114 1 1670188933.152031555 M86_MX67C_Anniston flows src=188.205.209.19 dst=101.25.132.114 protocol=tcp sport=27150 dport=23 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 27150, "protocol": 6, "streamName": "meraki", "clientIP": "188.205.209.19", "serverIP": "101.25.132.114" }
Create a JSON artifact from the message
<134>Original Address=101.25.132.114 1 1670188933.152031555 M86_MX67C_Anniston flows src=188.205.209.19 dst=101.25.132.114 protocol=tcp sport=27150 dport=23 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=101.25.132.114 1 1670188933.152031555 M86_MX67C_Anniston flows src=188.205.209.19 dst=101.25.132.114 protocol=tcp sport=27150 dport=23 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 23 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 27150 protocol: 6 streamName: meraki clientIP: 188.205.209.19 serverIP: 101.25.132.114
Explain this syslog message
<134>Original Address=141.208.29.12 1 1670188933.152031555 M86_MX67C_Anniston flows src=144.241.90.4 dst=141.208.29.12 protocol=tcp sport=27150 dport=23 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 23, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=141.208.29.12 1 1670188933.152031555 M86_MX67C_Anniston flows src=144.241.90.4 dst=141.208.29.12 protocol=tcp sport=27150 dport=23 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 27150, "protocol": 6, "streamName": "meraki", "clientIP": "144.241.90.4", "serverIP": "141.208.29.12" }
Create a JSON artifact from the message
<134>Original Address=141.208.29.12 1 1670188933.152031555 M86_MX67C_Anniston flows src=144.241.90.4 dst=141.208.29.12 protocol=tcp sport=27150 dport=23 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=141.208.29.12 1 1670188933.152031555 M86_MX67C_Anniston flows src=144.241.90.4 dst=141.208.29.12 protocol=tcp sport=27150 dport=23 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 23 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 27150 protocol: 6 streamName: meraki clientIP: 144.241.90.4 serverIP: 141.208.29.12
Explain this syslog message
<134>Original Address=147.42.42.170 1 1670188933.152031555 M86_MX67C_Anniston flows src=205.231.128.130 dst=147.42.42.170 protocol=tcp sport=27150 dport=23 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 23, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=147.42.42.170 1 1670188933.152031555 M86_MX67C_Anniston flows src=205.231.128.130 dst=147.42.42.170 protocol=tcp sport=27150 dport=23 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 27150, "protocol": 6, "streamName": "meraki", "clientIP": "205.231.128.130", "serverIP": "147.42.42.170" }
Create a JSON artifact from the message
<134>Original Address=147.42.42.170 1 1670188933.152031555 M86_MX67C_Anniston flows src=205.231.128.130 dst=147.42.42.170 protocol=tcp sport=27150 dport=23 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=147.42.42.170 1 1670188933.152031555 M86_MX67C_Anniston flows src=205.231.128.130 dst=147.42.42.170 protocol=tcp sport=27150 dport=23 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 23 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 27150 protocol: 6 streamName: meraki clientIP: 205.231.128.130 serverIP: 147.42.42.170
Explain this syslog message
<134>Original Address=54.152.185.140 1 1670068018.296439454 M86_MX67C_Anniston flows src=55.48.226.254 dst=54.152.185.140 protocol=tcp sport=35932 dport=62527 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 35932, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=54.152.185.140 1 1670068018.296439454 M86_MX67C_Anniston flows src=55.48.226.254 dst=54.152.185.140 protocol=tcp sport=35932 dport=62527 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 62527, "protocol": 6, "streamName": "meraki", "clientIP": "54.152.185.140", "serverIP": "55.48.226.254" }
Create a JSON artifact from the message
<134>Original Address=54.152.185.140 1 1670068018.296439454 M86_MX67C_Anniston flows src=55.48.226.254 dst=54.152.185.140 protocol=tcp sport=35932 dport=62527 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=54.152.185.140 1 1670068018.296439454 M86_MX67C_Anniston flows src=55.48.226.254 dst=54.152.185.140 protocol=tcp sport=35932 dport=62527 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 35932 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 62527 protocol: 6 streamName: meraki clientIP: 54.152.185.140 serverIP: 55.48.226.254
Explain this syslog message
<134>Original Address=135.154.1.152 1 1670068018.296439454 M86_MX67C_Anniston flows src=42.42.55.55 dst=135.154.1.152 protocol=tcp sport=35932 dport=62527 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 35932, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=135.154.1.152 1 1670068018.296439454 M86_MX67C_Anniston flows src=42.42.55.55 dst=135.154.1.152 protocol=tcp sport=35932 dport=62527 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 62527, "protocol": 6, "streamName": "meraki", "clientIP": "135.154.1.152", "serverIP": "42.42.55.55" }
Create a JSON artifact from the message