input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<164>Dec 24 2022 08:05:59: %ASA-4-106023: Deny tcp src outside:20.88.42.154/52996 dst dmz-1:254.78.112.197/52088 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 52088,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Dec 24 2022 08:05:59: %ASA-4-106023: Deny tcp src outside:20.88.42.154/52996 dst dmz-1:254.78.112.197/52088 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 52996,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "20.88.42.154",
"serverIP": "254.78.112.197"
} | Create a JSON artifact from the message |
<164>Dec 24 2022 08:05:59: %ASA-4-106023: Deny tcp src outside:20.88.42.154/52996 dst dmz-1:254.78.112.197/52088 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Dec 24 2022 08:05:59: %ASA-4-106023: Deny tcp src outside:20.88.42.154/52996 dst dmz-1:254.78.112.197/52088 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 52088
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 52996
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 20.88.42.154
serverIP: 254.78.112.197 | Explain this syslog message |
<164>Dec 24 2022 08:05:59: %ASA-4-106023: Deny tcp src outside:74.217.53.111/52996 dst dmz-1:11.237.138.80/52088 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 52088,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Dec 24 2022 08:05:59: %ASA-4-106023: Deny tcp src outside:74.217.53.111/52996 dst dmz-1:11.237.138.80/52088 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 52996,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "74.217.53.111",
"serverIP": "11.237.138.80"
} | Create a JSON artifact from the message |
<164>Dec 24 2022 08:05:59: %ASA-4-106023: Deny tcp src outside:74.217.53.111/52996 dst dmz-1:11.237.138.80/52088 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Dec 24 2022 08:05:59: %ASA-4-106023: Deny tcp src outside:74.217.53.111/52996 dst dmz-1:11.237.138.80/52088 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 52088
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 52996
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 74.217.53.111
serverIP: 11.237.138.80 | Explain this syslog message |
<164>Dec 24 2022 08:06:09: %ASA-4-106023: Deny tcp src outside:170.51.35.152/39558 dst dmz-1:201.45.31.39/23 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Dec 24 2022 08:06:09: %ASA-4-106023: Deny tcp src outside:170.51.35.152/39558 dst dmz-1:201.45.31.39/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 39558,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "170.51.35.152",
"serverIP": "201.45.31.39"
} | Create a JSON artifact from the message |
<164>Dec 24 2022 08:06:09: %ASA-4-106023: Deny tcp src outside:170.51.35.152/39558 dst dmz-1:201.45.31.39/23 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Dec 24 2022 08:06:09: %ASA-4-106023: Deny tcp src outside:170.51.35.152/39558 dst dmz-1:201.45.31.39/23 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 39558
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 170.51.35.152
serverIP: 201.45.31.39 | Explain this syslog message |
<164>Dec 24 2022 08:06:09: %ASA-4-106023: Deny tcp src outside:153.153.55.229/39558 dst dmz-1:66.120.192.207/23 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Dec 24 2022 08:06:09: %ASA-4-106023: Deny tcp src outside:153.153.55.229/39558 dst dmz-1:66.120.192.207/23 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 39558,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "153.153.55.229",
"serverIP": "66.120.192.207"
} | Create a JSON artifact from the message |
<164>Dec 24 2022 08:06:09: %ASA-4-106023: Deny tcp src outside:153.153.55.229/39558 dst dmz-1:66.120.192.207/23 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Dec 24 2022 08:06:09: %ASA-4-106023: Deny tcp src outside:153.153.55.229/39558 dst dmz-1:66.120.192.207/23 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 39558
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 153.153.55.229
serverIP: 66.120.192.207 | Explain this syslog message |
<134>Original Address=205.170.169.42 1 1658399570.782680764 M58_MX67_FtWalton flows src=36.202.77.154 dst=6.138.105.220 protocol=tcp sport=50776 dport=3481 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 3481,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=205.170.169.42 1 1658399570.782680764 M58_MX67_FtWalton flows src=36.202.77.154 dst=6.138.105.220 protocol=tcp sport=50776 dport=3481 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 50776,
"protocol": 6,
"streamName": "meraki",
"clientIP": "36.202.77.154",
"serverIP": "6.138.105.220"
} | Create a JSON artifact from the message |
<134>Original Address=205.170.169.42 1 1658399570.782680764 M58_MX67_FtWalton flows src=36.202.77.154 dst=6.138.105.220 protocol=tcp sport=50776 dport=3481 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=205.170.169.42 1 1658399570.782680764 M58_MX67_FtWalton flows src=36.202.77.154 dst=6.138.105.220 protocol=tcp sport=50776 dport=3481 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 3481
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 50776
protocol: 6
streamName: meraki
clientIP: 36.202.77.154
serverIP: 6.138.105.220 | Explain this syslog message |
<134>Original Address=205.170.169.42 1 1658399570.782680764 M58_MX67_FtWalton flows src=15.140.180.238 dst=90.19.141.204 protocol=tcp sport=50776 dport=3481 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 3481,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=205.170.169.42 1 1658399570.782680764 M58_MX67_FtWalton flows src=15.140.180.238 dst=90.19.141.204 protocol=tcp sport=50776 dport=3481 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 50776,
"protocol": 6,
"streamName": "meraki",
"clientIP": "15.140.180.238",
"serverIP": "90.19.141.204"
} | Create a JSON artifact from the message |
<134>Original Address=205.170.169.42 1 1658399570.782680764 M58_MX67_FtWalton flows src=15.140.180.238 dst=90.19.141.204 protocol=tcp sport=50776 dport=3481 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=205.170.169.42 1 1658399570.782680764 M58_MX67_FtWalton flows src=15.140.180.238 dst=90.19.141.204 protocol=tcp sport=50776 dport=3481 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 3481
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 50776
protocol: 6
streamName: meraki
clientIP: 15.140.180.238
serverIP: 90.19.141.204 | Explain this syslog message |
<134>Original Address=205.170.169.42 1 1658399570.782680764 M58_MX67_FtWalton flows src=107.252.167.249 dst=215.146.241.253 protocol=tcp sport=50776 dport=3481 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 3481,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=205.170.169.42 1 1658399570.782680764 M58_MX67_FtWalton flows src=107.252.167.249 dst=215.146.241.253 protocol=tcp sport=50776 dport=3481 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 50776,
"protocol": 6,
"streamName": "meraki",
"clientIP": "107.252.167.249",
"serverIP": "215.146.241.253"
} | Create a JSON artifact from the message |
<134>Original Address=205.170.169.42 1 1658399570.782680764 M58_MX67_FtWalton flows src=107.252.167.249 dst=215.146.241.253 protocol=tcp sport=50776 dport=3481 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=205.170.169.42 1 1658399570.782680764 M58_MX67_FtWalton flows src=107.252.167.249 dst=215.146.241.253 protocol=tcp sport=50776 dport=3481 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 3481
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 50776
protocol: 6
streamName: meraki
clientIP: 107.252.167.249
serverIP: 215.146.241.253 | Explain this syslog message |
<134>Original Address=205.170.169.42 1 1658399570.782680764 M58_MX67_FtWalton flows src=129.50.121.55 dst=13.62.110.150 protocol=tcp sport=50776 dport=3481 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 3481,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=205.170.169.42 1 1658399570.782680764 M58_MX67_FtWalton flows src=129.50.121.55 dst=13.62.110.150 protocol=tcp sport=50776 dport=3481 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 50776,
"protocol": 6,
"streamName": "meraki",
"clientIP": "129.50.121.55",
"serverIP": "13.62.110.150"
} | Create a JSON artifact from the message |
<134>Original Address=205.170.169.42 1 1658399570.782680764 M58_MX67_FtWalton flows src=129.50.121.55 dst=13.62.110.150 protocol=tcp sport=50776 dport=3481 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=205.170.169.42 1 1658399570.782680764 M58_MX67_FtWalton flows src=129.50.121.55 dst=13.62.110.150 protocol=tcp sport=50776 dport=3481 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 3481
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 50776
protocol: 6
streamName: meraki
clientIP: 129.50.121.55
serverIP: 13.62.110.150 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660672646.037833967 NORDC_MX400_1 flows src=236.200.249.179 dst=85.11.91.201 protocol=tcp sport=3375 dport=25 pattern: 1 dst 85.11.91.201 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660672646.037833967 NORDC_MX400_1 flows src=236.200.249.179 dst=85.11.91.201 protocol=tcp sport=3375 dport=25 pattern: 1 dst 85.11.91.201",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 3375,
"protocol": 6,
"streamName": "meraki",
"clientIP": "236.200.249.179",
"serverIP": "85.11.91.201"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660672646.037833967 NORDC_MX400_1 flows src=236.200.249.179 dst=85.11.91.201 protocol=tcp sport=3375 dport=25 pattern: 1 dst 85.11.91.201 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660672646.037833967 NORDC_MX400_1 flows src=236.200.249.179 dst=85.11.91.201 protocol=tcp sport=3375 dport=25 pattern: 1 dst 85.11.91.201 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 3375
protocol: 6
streamName: meraki
clientIP: 236.200.249.179
serverIP: 85.11.91.201 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660672646.037833967 NORDC_MX400_1 flows src=41.46.99.179 dst=86.116.212.62 protocol=tcp sport=3375 dport=25 pattern: 1 dst 86.116.212.62 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660672646.037833967 NORDC_MX400_1 flows src=41.46.99.179 dst=86.116.212.62 protocol=tcp sport=3375 dport=25 pattern: 1 dst 86.116.212.62",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 3375,
"protocol": 6,
"streamName": "meraki",
"clientIP": "41.46.99.179",
"serverIP": "86.116.212.62"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660672646.037833967 NORDC_MX400_1 flows src=41.46.99.179 dst=86.116.212.62 protocol=tcp sport=3375 dport=25 pattern: 1 dst 86.116.212.62 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660672646.037833967 NORDC_MX400_1 flows src=41.46.99.179 dst=86.116.212.62 protocol=tcp sport=3375 dport=25 pattern: 1 dst 86.116.212.62 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 3375
protocol: 6
streamName: meraki
clientIP: 41.46.99.179
serverIP: 86.116.212.62 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660672645.796258285 NORDC_MX400_1 flows src=159.78.228.44 dst=186.174.56.208 protocol=udp sport=4104 dport=4104 pattern: 1 dst 186.174.56.208 | {
"senderhost": "192.168.2.250",
"serverport": 4104,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660672645.796258285 NORDC_MX400_1 flows src=159.78.228.44 dst=186.174.56.208 protocol=udp sport=4104 dport=4104 pattern: 1 dst 186.174.56.208",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 4104,
"protocol": 17,
"streamName": "meraki",
"clientIP": "186.174.56.208",
"serverIP": "159.78.228.44"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660672645.796258285 NORDC_MX400_1 flows src=159.78.228.44 dst=186.174.56.208 protocol=udp sport=4104 dport=4104 pattern: 1 dst 186.174.56.208 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660672645.796258285 NORDC_MX400_1 flows src=159.78.228.44 dst=186.174.56.208 protocol=udp sport=4104 dport=4104 pattern: 1 dst 186.174.56.208 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 4104
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 4104
protocol: 17
streamName: meraki
clientIP: 186.174.56.208
serverIP: 159.78.228.44 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660672645.796258285 NORDC_MX400_1 flows src=72.167.66.8 dst=119.145.23.60 protocol=udp sport=4104 dport=4104 pattern: 1 dst 119.145.23.60 | {
"senderhost": "192.168.2.250",
"serverport": 4104,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660672645.796258285 NORDC_MX400_1 flows src=72.167.66.8 dst=119.145.23.60 protocol=udp sport=4104 dport=4104 pattern: 1 dst 119.145.23.60",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 4104,
"protocol": 17,
"streamName": "meraki",
"clientIP": "119.145.23.60",
"serverIP": "72.167.66.8"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660672645.796258285 NORDC_MX400_1 flows src=72.167.66.8 dst=119.145.23.60 protocol=udp sport=4104 dport=4104 pattern: 1 dst 119.145.23.60 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660672645.796258285 NORDC_MX400_1 flows src=72.167.66.8 dst=119.145.23.60 protocol=udp sport=4104 dport=4104 pattern: 1 dst 119.145.23.60 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 4104
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 4104
protocol: 17
streamName: meraki
clientIP: 119.145.23.60
serverIP: 72.167.66.8 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660672645.801585752 NORDC_MX400_1 flows src=82.46.203.141 dst=146.75.9.254 protocol=tcp sport=17825 dport=25 pattern: 1 dst 146.75.9.254 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660672645.801585752 NORDC_MX400_1 flows src=82.46.203.141 dst=146.75.9.254 protocol=tcp sport=17825 dport=25 pattern: 1 dst 146.75.9.254",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 17825,
"protocol": 6,
"streamName": "meraki",
"clientIP": "82.46.203.141",
"serverIP": "146.75.9.254"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660672645.801585752 NORDC_MX400_1 flows src=82.46.203.141 dst=146.75.9.254 protocol=tcp sport=17825 dport=25 pattern: 1 dst 146.75.9.254 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660672645.801585752 NORDC_MX400_1 flows src=82.46.203.141 dst=146.75.9.254 protocol=tcp sport=17825 dport=25 pattern: 1 dst 146.75.9.254 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 17825
protocol: 6
streamName: meraki
clientIP: 82.46.203.141
serverIP: 146.75.9.254 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660672645.801585752 NORDC_MX400_1 flows src=238.43.47.243 dst=210.155.87.93 protocol=tcp sport=17825 dport=25 pattern: 1 dst 210.155.87.93 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660672645.801585752 NORDC_MX400_1 flows src=238.43.47.243 dst=210.155.87.93 protocol=tcp sport=17825 dport=25 pattern: 1 dst 210.155.87.93",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 17825,
"protocol": 6,
"streamName": "meraki",
"clientIP": "238.43.47.243",
"serverIP": "210.155.87.93"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660672645.801585752 NORDC_MX400_1 flows src=238.43.47.243 dst=210.155.87.93 protocol=tcp sport=17825 dport=25 pattern: 1 dst 210.155.87.93 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660672645.801585752 NORDC_MX400_1 flows src=238.43.47.243 dst=210.155.87.93 protocol=tcp sport=17825 dport=25 pattern: 1 dst 210.155.87.93 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 17825
protocol: 6
streamName: meraki
clientIP: 238.43.47.243
serverIP: 210.155.87.93 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660672645.783448957 NORDC_MX400_1 flows src=158.171.127.133 dst=228.134.97.158 protocol=tcp sport=26632 dport=25 pattern: 1 dst 228.134.97.158 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660672645.783448957 NORDC_MX400_1 flows src=158.171.127.133 dst=228.134.97.158 protocol=tcp sport=26632 dport=25 pattern: 1 dst 228.134.97.158",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 26632,
"protocol": 6,
"streamName": "meraki",
"clientIP": "158.171.127.133",
"serverIP": "228.134.97.158"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660672645.783448957 NORDC_MX400_1 flows src=158.171.127.133 dst=228.134.97.158 protocol=tcp sport=26632 dport=25 pattern: 1 dst 228.134.97.158 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660672645.783448957 NORDC_MX400_1 flows src=158.171.127.133 dst=228.134.97.158 protocol=tcp sport=26632 dport=25 pattern: 1 dst 228.134.97.158 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 26632
protocol: 6
streamName: meraki
clientIP: 158.171.127.133
serverIP: 228.134.97.158 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660672645.783448957 NORDC_MX400_1 flows src=86.16.129.72 dst=34.133.72.8 protocol=tcp sport=26632 dport=25 pattern: 1 dst 34.133.72.8 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660672645.783448957 NORDC_MX400_1 flows src=86.16.129.72 dst=34.133.72.8 protocol=tcp sport=26632 dport=25 pattern: 1 dst 34.133.72.8",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 26632,
"protocol": 6,
"streamName": "meraki",
"clientIP": "86.16.129.72",
"serverIP": "34.133.72.8"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660672645.783448957 NORDC_MX400_1 flows src=86.16.129.72 dst=34.133.72.8 protocol=tcp sport=26632 dport=25 pattern: 1 dst 34.133.72.8 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660672645.783448957 NORDC_MX400_1 flows src=86.16.129.72 dst=34.133.72.8 protocol=tcp sport=26632 dport=25 pattern: 1 dst 34.133.72.8 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 26632
protocol: 6
streamName: meraki
clientIP: 86.16.129.72
serverIP: 34.133.72.8 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660672646.127594832 NORDC_MX400_1 flows src=134.26.244.105 dst=140.93.218.37 protocol=tcp sport=6617 dport=25 pattern: 1 dst 140.93.218.37 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660672646.127594832 NORDC_MX400_1 flows src=134.26.244.105 dst=140.93.218.37 protocol=tcp sport=6617 dport=25 pattern: 1 dst 140.93.218.37",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6617,
"protocol": 6,
"streamName": "meraki",
"clientIP": "134.26.244.105",
"serverIP": "140.93.218.37"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660672646.127594832 NORDC_MX400_1 flows src=134.26.244.105 dst=140.93.218.37 protocol=tcp sport=6617 dport=25 pattern: 1 dst 140.93.218.37 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660672646.127594832 NORDC_MX400_1 flows src=134.26.244.105 dst=140.93.218.37 protocol=tcp sport=6617 dport=25 pattern: 1 dst 140.93.218.37 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6617
protocol: 6
streamName: meraki
clientIP: 134.26.244.105
serverIP: 140.93.218.37 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660672646.127594832 NORDC_MX400_1 flows src=98.65.103.27 dst=15.117.214.72 protocol=tcp sport=6617 dport=25 pattern: 1 dst 15.117.214.72 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660672646.127594832 NORDC_MX400_1 flows src=98.65.103.27 dst=15.117.214.72 protocol=tcp sport=6617 dport=25 pattern: 1 dst 15.117.214.72",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6617,
"protocol": 6,
"streamName": "meraki",
"clientIP": "98.65.103.27",
"serverIP": "15.117.214.72"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660672646.127594832 NORDC_MX400_1 flows src=98.65.103.27 dst=15.117.214.72 protocol=tcp sport=6617 dport=25 pattern: 1 dst 15.117.214.72 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660672646.127594832 NORDC_MX400_1 flows src=98.65.103.27 dst=15.117.214.72 protocol=tcp sport=6617 dport=25 pattern: 1 dst 15.117.214.72 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6617
protocol: 6
streamName: meraki
clientIP: 98.65.103.27
serverIP: 15.117.214.72 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660672646.591026112 NORDC_MX400_1 flows src=238.59.253.192 dst=131.192.140.78 protocol=tcp sport=6306 dport=25 pattern: 1 dst 131.192.140.78 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660672646.591026112 NORDC_MX400_1 flows src=238.59.253.192 dst=131.192.140.78 protocol=tcp sport=6306 dport=25 pattern: 1 dst 131.192.140.78",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6306,
"protocol": 6,
"streamName": "meraki",
"clientIP": "238.59.253.192",
"serverIP": "131.192.140.78"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660672646.591026112 NORDC_MX400_1 flows src=238.59.253.192 dst=131.192.140.78 protocol=tcp sport=6306 dport=25 pattern: 1 dst 131.192.140.78 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660672646.591026112 NORDC_MX400_1 flows src=238.59.253.192 dst=131.192.140.78 protocol=tcp sport=6306 dport=25 pattern: 1 dst 131.192.140.78 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6306
protocol: 6
streamName: meraki
clientIP: 238.59.253.192
serverIP: 131.192.140.78 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660672646.591026112 NORDC_MX400_1 flows src=251.221.37.62 dst=183.9.58.238 protocol=tcp sport=6306 dport=25 pattern: 1 dst 183.9.58.238 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660672646.591026112 NORDC_MX400_1 flows src=251.221.37.62 dst=183.9.58.238 protocol=tcp sport=6306 dport=25 pattern: 1 dst 183.9.58.238",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6306,
"protocol": 6,
"streamName": "meraki",
"clientIP": "251.221.37.62",
"serverIP": "183.9.58.238"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660672646.591026112 NORDC_MX400_1 flows src=251.221.37.62 dst=183.9.58.238 protocol=tcp sport=6306 dport=25 pattern: 1 dst 183.9.58.238 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660672646.591026112 NORDC_MX400_1 flows src=251.221.37.62 dst=183.9.58.238 protocol=tcp sport=6306 dport=25 pattern: 1 dst 183.9.58.238 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6306
protocol: 6
streamName: meraki
clientIP: 251.221.37.62
serverIP: 183.9.58.238 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660672646.037833967 NORDC_MX400_1 flows src=64.148.42.143 dst=103.146.234.14 protocol=tcp sport=3375 dport=25 pattern: 1 dst 103.146.234.14 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660672646.037833967 NORDC_MX400_1 flows src=64.148.42.143 dst=103.146.234.14 protocol=tcp sport=3375 dport=25 pattern: 1 dst 103.146.234.14",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 3375,
"protocol": 6,
"streamName": "meraki",
"clientIP": "64.148.42.143",
"serverIP": "103.146.234.14"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660672646.037833967 NORDC_MX400_1 flows src=64.148.42.143 dst=103.146.234.14 protocol=tcp sport=3375 dport=25 pattern: 1 dst 103.146.234.14 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660672646.037833967 NORDC_MX400_1 flows src=64.148.42.143 dst=103.146.234.14 protocol=tcp sport=3375 dport=25 pattern: 1 dst 103.146.234.14 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 3375
protocol: 6
streamName: meraki
clientIP: 64.148.42.143
serverIP: 103.146.234.14 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660672646.037833967 NORDC_MX400_1 flows src=55.106.228.75 dst=61.49.28.186 protocol=tcp sport=3375 dport=25 pattern: 1 dst 61.49.28.186 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660672646.037833967 NORDC_MX400_1 flows src=55.106.228.75 dst=61.49.28.186 protocol=tcp sport=3375 dport=25 pattern: 1 dst 61.49.28.186",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 3375,
"protocol": 6,
"streamName": "meraki",
"clientIP": "55.106.228.75",
"serverIP": "61.49.28.186"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660672646.037833967 NORDC_MX400_1 flows src=55.106.228.75 dst=61.49.28.186 protocol=tcp sport=3375 dport=25 pattern: 1 dst 61.49.28.186 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660672646.037833967 NORDC_MX400_1 flows src=55.106.228.75 dst=61.49.28.186 protocol=tcp sport=3375 dport=25 pattern: 1 dst 61.49.28.186 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 3375
protocol: 6
streamName: meraki
clientIP: 55.106.228.75
serverIP: 61.49.28.186 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660672646.178601375 NORDC_MX400_1 flows src=116.67.136.99 dst=87.69.221.250 protocol=tcp sport=33353 dport=25 pattern: 1 dst 87.69.221.250 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660672646.178601375 NORDC_MX400_1 flows src=116.67.136.99 dst=87.69.221.250 protocol=tcp sport=33353 dport=25 pattern: 1 dst 87.69.221.250",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 33353,
"protocol": 6,
"streamName": "meraki",
"clientIP": "116.67.136.99",
"serverIP": "87.69.221.250"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660672646.178601375 NORDC_MX400_1 flows src=116.67.136.99 dst=87.69.221.250 protocol=tcp sport=33353 dport=25 pattern: 1 dst 87.69.221.250 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660672646.178601375 NORDC_MX400_1 flows src=116.67.136.99 dst=87.69.221.250 protocol=tcp sport=33353 dport=25 pattern: 1 dst 87.69.221.250 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 33353
protocol: 6
streamName: meraki
clientIP: 116.67.136.99
serverIP: 87.69.221.250 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660672646.178601375 NORDC_MX400_1 flows src=9.148.223.48 dst=18.140.245.251 protocol=tcp sport=33353 dport=25 pattern: 1 dst 18.140.245.251 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660672646.178601375 NORDC_MX400_1 flows src=9.148.223.48 dst=18.140.245.251 protocol=tcp sport=33353 dport=25 pattern: 1 dst 18.140.245.251",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 33353,
"protocol": 6,
"streamName": "meraki",
"clientIP": "9.148.223.48",
"serverIP": "18.140.245.251"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660672646.178601375 NORDC_MX400_1 flows src=9.148.223.48 dst=18.140.245.251 protocol=tcp sport=33353 dport=25 pattern: 1 dst 18.140.245.251 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660672646.178601375 NORDC_MX400_1 flows src=9.148.223.48 dst=18.140.245.251 protocol=tcp sport=33353 dport=25 pattern: 1 dst 18.140.245.251 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 33353
protocol: 6
streamName: meraki
clientIP: 9.148.223.48
serverIP: 18.140.245.251 | Explain this syslog message |
<134>Original Address=24.216.133.2 1 1670186224.605917277 M36_MX67C_Athens flows src=230.29.69.91 dst=160.55.68.229 protocol=tcp sport=61953 dport=8018 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 8018,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.216.133.2 1 1670186224.605917277 M36_MX67C_Athens flows src=230.29.69.91 dst=160.55.68.229 protocol=tcp sport=61953 dport=8018 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 61953,
"protocol": 6,
"streamName": "meraki",
"clientIP": "230.29.69.91",
"serverIP": "160.55.68.229"
} | Create a JSON artifact from the message |
<134>Original Address=24.216.133.2 1 1670186224.605917277 M36_MX67C_Athens flows src=230.29.69.91 dst=160.55.68.229 protocol=tcp sport=61953 dport=8018 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.216.133.2 1 1670186224.605917277 M36_MX67C_Athens flows src=230.29.69.91 dst=160.55.68.229 protocol=tcp sport=61953 dport=8018 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 8018
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 61953
protocol: 6
streamName: meraki
clientIP: 230.29.69.91
serverIP: 160.55.68.229 | Explain this syslog message |
<134>Original Address=24.216.133.2 1 1670186224.605917277 M36_MX67C_Athens flows src=205.62.39.250 dst=216.254.143.29 protocol=tcp sport=61953 dport=8018 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 8018,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.216.133.2 1 1670186224.605917277 M36_MX67C_Athens flows src=205.62.39.250 dst=216.254.143.29 protocol=tcp sport=61953 dport=8018 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 61953,
"protocol": 6,
"streamName": "meraki",
"clientIP": "205.62.39.250",
"serverIP": "216.254.143.29"
} | Create a JSON artifact from the message |
<134>Original Address=24.216.133.2 1 1670186224.605917277 M36_MX67C_Athens flows src=205.62.39.250 dst=216.254.143.29 protocol=tcp sport=61953 dport=8018 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.216.133.2 1 1670186224.605917277 M36_MX67C_Athens flows src=205.62.39.250 dst=216.254.143.29 protocol=tcp sport=61953 dport=8018 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 8018
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 61953
protocol: 6
streamName: meraki
clientIP: 205.62.39.250
serverIP: 216.254.143.29 | Explain this syslog message |
<134>Original Address=24.216.133.2 1 1670186224.605917277 M36_MX67C_Athens flows src=38.71.7.161 dst=9.225.100.233 protocol=tcp sport=61953 dport=8018 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 8018,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.216.133.2 1 1670186224.605917277 M36_MX67C_Athens flows src=38.71.7.161 dst=9.225.100.233 protocol=tcp sport=61953 dport=8018 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 61953,
"protocol": 6,
"streamName": "meraki",
"clientIP": "38.71.7.161",
"serverIP": "9.225.100.233"
} | Create a JSON artifact from the message |
<134>Original Address=24.216.133.2 1 1670186224.605917277 M36_MX67C_Athens flows src=38.71.7.161 dst=9.225.100.233 protocol=tcp sport=61953 dport=8018 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.216.133.2 1 1670186224.605917277 M36_MX67C_Athens flows src=38.71.7.161 dst=9.225.100.233 protocol=tcp sport=61953 dport=8018 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 8018
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 61953
protocol: 6
streamName: meraki
clientIP: 38.71.7.161
serverIP: 9.225.100.233 | Explain this syslog message |
<134>Original Address=24.216.133.2 1 1670186224.605917277 M36_MX67C_Athens flows src=182.206.96.77 dst=236.105.103.251 protocol=tcp sport=61953 dport=8018 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 8018,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.216.133.2 1 1670186224.605917277 M36_MX67C_Athens flows src=182.206.96.77 dst=236.105.103.251 protocol=tcp sport=61953 dport=8018 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 61953,
"protocol": 6,
"streamName": "meraki",
"clientIP": "182.206.96.77",
"serverIP": "236.105.103.251"
} | Create a JSON artifact from the message |
<134>Original Address=24.216.133.2 1 1670186224.605917277 M36_MX67C_Athens flows src=182.206.96.77 dst=236.105.103.251 protocol=tcp sport=61953 dport=8018 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.216.133.2 1 1670186224.605917277 M36_MX67C_Athens flows src=182.206.96.77 dst=236.105.103.251 protocol=tcp sport=61953 dport=8018 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 8018
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 61953
protocol: 6
streamName: meraki
clientIP: 182.206.96.77
serverIP: 236.105.103.251 | Explain this syslog message |
<134>Original Address=225.238.183.8 1 1670188933.152031555 M86_MX67C_Anniston flows src=188.67.71.92 dst=225.238.183.8 protocol=tcp sport=27150 dport=23 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 23,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=225.238.183.8 1 1670188933.152031555 M86_MX67C_Anniston flows src=188.67.71.92 dst=225.238.183.8 protocol=tcp sport=27150 dport=23 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 27150,
"protocol": 6,
"streamName": "meraki",
"clientIP": "188.67.71.92",
"serverIP": "225.238.183.8"
} | Create a JSON artifact from the message |
<134>Original Address=225.238.183.8 1 1670188933.152031555 M86_MX67C_Anniston flows src=188.67.71.92 dst=225.238.183.8 protocol=tcp sport=27150 dport=23 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=225.238.183.8 1 1670188933.152031555 M86_MX67C_Anniston flows src=188.67.71.92 dst=225.238.183.8 protocol=tcp sport=27150 dport=23 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 23
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 27150
protocol: 6
streamName: meraki
clientIP: 188.67.71.92
serverIP: 225.238.183.8 | Explain this syslog message |
<134>Original Address=101.25.132.114 1 1670188933.152031555 M86_MX67C_Anniston flows src=188.205.209.19 dst=101.25.132.114 protocol=tcp sport=27150 dport=23 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 23,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=101.25.132.114 1 1670188933.152031555 M86_MX67C_Anniston flows src=188.205.209.19 dst=101.25.132.114 protocol=tcp sport=27150 dport=23 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 27150,
"protocol": 6,
"streamName": "meraki",
"clientIP": "188.205.209.19",
"serverIP": "101.25.132.114"
} | Create a JSON artifact from the message |
<134>Original Address=101.25.132.114 1 1670188933.152031555 M86_MX67C_Anniston flows src=188.205.209.19 dst=101.25.132.114 protocol=tcp sport=27150 dport=23 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=101.25.132.114 1 1670188933.152031555 M86_MX67C_Anniston flows src=188.205.209.19 dst=101.25.132.114 protocol=tcp sport=27150 dport=23 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 23
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 27150
protocol: 6
streamName: meraki
clientIP: 188.205.209.19
serverIP: 101.25.132.114 | Explain this syslog message |
<134>Original Address=141.208.29.12 1 1670188933.152031555 M86_MX67C_Anniston flows src=144.241.90.4 dst=141.208.29.12 protocol=tcp sport=27150 dport=23 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 23,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=141.208.29.12 1 1670188933.152031555 M86_MX67C_Anniston flows src=144.241.90.4 dst=141.208.29.12 protocol=tcp sport=27150 dport=23 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 27150,
"protocol": 6,
"streamName": "meraki",
"clientIP": "144.241.90.4",
"serverIP": "141.208.29.12"
} | Create a JSON artifact from the message |
<134>Original Address=141.208.29.12 1 1670188933.152031555 M86_MX67C_Anniston flows src=144.241.90.4 dst=141.208.29.12 protocol=tcp sport=27150 dport=23 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=141.208.29.12 1 1670188933.152031555 M86_MX67C_Anniston flows src=144.241.90.4 dst=141.208.29.12 protocol=tcp sport=27150 dport=23 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 23
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 27150
protocol: 6
streamName: meraki
clientIP: 144.241.90.4
serverIP: 141.208.29.12 | Explain this syslog message |
<134>Original Address=147.42.42.170 1 1670188933.152031555 M86_MX67C_Anniston flows src=205.231.128.130 dst=147.42.42.170 protocol=tcp sport=27150 dport=23 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 23,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=147.42.42.170 1 1670188933.152031555 M86_MX67C_Anniston flows src=205.231.128.130 dst=147.42.42.170 protocol=tcp sport=27150 dport=23 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 27150,
"protocol": 6,
"streamName": "meraki",
"clientIP": "205.231.128.130",
"serverIP": "147.42.42.170"
} | Create a JSON artifact from the message |
<134>Original Address=147.42.42.170 1 1670188933.152031555 M86_MX67C_Anniston flows src=205.231.128.130 dst=147.42.42.170 protocol=tcp sport=27150 dport=23 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=147.42.42.170 1 1670188933.152031555 M86_MX67C_Anniston flows src=205.231.128.130 dst=147.42.42.170 protocol=tcp sport=27150 dport=23 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 23
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 27150
protocol: 6
streamName: meraki
clientIP: 205.231.128.130
serverIP: 147.42.42.170 | Explain this syslog message |
<134>Original Address=54.152.185.140 1 1670068018.296439454 M86_MX67C_Anniston flows src=55.48.226.254 dst=54.152.185.140 protocol=tcp sport=35932 dport=62527 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 35932,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=54.152.185.140 1 1670068018.296439454 M86_MX67C_Anniston flows src=55.48.226.254 dst=54.152.185.140 protocol=tcp sport=35932 dport=62527 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 62527,
"protocol": 6,
"streamName": "meraki",
"clientIP": "54.152.185.140",
"serverIP": "55.48.226.254"
} | Create a JSON artifact from the message |
<134>Original Address=54.152.185.140 1 1670068018.296439454 M86_MX67C_Anniston flows src=55.48.226.254 dst=54.152.185.140 protocol=tcp sport=35932 dport=62527 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=54.152.185.140 1 1670068018.296439454 M86_MX67C_Anniston flows src=55.48.226.254 dst=54.152.185.140 protocol=tcp sport=35932 dport=62527 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 35932
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 62527
protocol: 6
streamName: meraki
clientIP: 54.152.185.140
serverIP: 55.48.226.254 | Explain this syslog message |
<134>Original Address=135.154.1.152 1 1670068018.296439454 M86_MX67C_Anniston flows src=42.42.55.55 dst=135.154.1.152 protocol=tcp sport=35932 dport=62527 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 35932,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=135.154.1.152 1 1670068018.296439454 M86_MX67C_Anniston flows src=42.42.55.55 dst=135.154.1.152 protocol=tcp sport=35932 dport=62527 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 62527,
"protocol": 6,
"streamName": "meraki",
"clientIP": "135.154.1.152",
"serverIP": "42.42.55.55"
} | Create a JSON artifact from the message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.