input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<134>Original Address=96.73.199.109 1 1670186227.811649148 M34_MX67C_Atlanta flows src=217.205.142.96 dst=148.224.5.240 protocol=tcp sport=61641 dport=3389 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 3389
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 61641
protocol: 6
streamName: meraki
clientIP: 217.205.142.96
serverIP: 148.224.5.240 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1670186227.811649148 M34_MX67C_Atlanta flows src=241.220.114.15 dst=150.122.198.37 protocol=tcp sport=61641 dport=3389 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 3389,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1670186227.811649148 M34_MX67C_Atlanta flows src=241.220.114.15 dst=150.122.198.37 protocol=tcp sport=61641 dport=3389 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 61641,
"protocol": 6,
"streamName": "meraki",
"clientIP": "241.220.114.15",
"serverIP": "150.122.198.37"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1670186227.811649148 M34_MX67C_Atlanta flows src=241.220.114.15 dst=150.122.198.37 protocol=tcp sport=61641 dport=3389 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1670186227.811649148 M34_MX67C_Atlanta flows src=241.220.114.15 dst=150.122.198.37 protocol=tcp sport=61641 dport=3389 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 3389
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 61641
protocol: 6
streamName: meraki
clientIP: 241.220.114.15
serverIP: 150.122.198.37 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1670186227.811649148 M34_MX67C_Atlanta flows src=57.165.78.121 dst=219.92.33.91 protocol=tcp sport=61641 dport=3389 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 3389,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1670186227.811649148 M34_MX67C_Atlanta flows src=57.165.78.121 dst=219.92.33.91 protocol=tcp sport=61641 dport=3389 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 61641,
"protocol": 6,
"streamName": "meraki",
"clientIP": "57.165.78.121",
"serverIP": "219.92.33.91"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1670186227.811649148 M34_MX67C_Atlanta flows src=57.165.78.121 dst=219.92.33.91 protocol=tcp sport=61641 dport=3389 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1670186227.811649148 M34_MX67C_Atlanta flows src=57.165.78.121 dst=219.92.33.91 protocol=tcp sport=61641 dport=3389 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 3389
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 61641
protocol: 6
streamName: meraki
clientIP: 57.165.78.121
serverIP: 219.92.33.91 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1670186227.811649148 M34_MX67C_Atlanta flows src=10.49.110.224 dst=228.54.22.213 protocol=tcp sport=61641 dport=3389 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 3389,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1670186227.811649148 M34_MX67C_Atlanta flows src=10.49.110.224 dst=228.54.22.213 protocol=tcp sport=61641 dport=3389 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 61641,
"protocol": 6,
"streamName": "meraki",
"clientIP": "10.49.110.224",
"serverIP": "228.54.22.213"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1670186227.811649148 M34_MX67C_Atlanta flows src=10.49.110.224 dst=228.54.22.213 protocol=tcp sport=61641 dport=3389 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1670186227.811649148 M34_MX67C_Atlanta flows src=10.49.110.224 dst=228.54.22.213 protocol=tcp sport=61641 dport=3389 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 3389
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 61641
protocol: 6
streamName: meraki
clientIP: 10.49.110.224
serverIP: 228.54.22.213 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1670186232.818147948 M34_MX67C_Atlanta flows src=136.219.42.2 dst=108.55.125.169 protocol=tcp sport=62454 dport=3390 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 3390,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1670186232.818147948 M34_MX67C_Atlanta flows src=136.219.42.2 dst=108.55.125.169 protocol=tcp sport=62454 dport=3390 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 62454,
"protocol": 6,
"streamName": "meraki",
"clientIP": "136.219.42.2",
"serverIP": "108.55.125.169"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1670186232.818147948 M34_MX67C_Atlanta flows src=136.219.42.2 dst=108.55.125.169 protocol=tcp sport=62454 dport=3390 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1670186232.818147948 M34_MX67C_Atlanta flows src=136.219.42.2 dst=108.55.125.169 protocol=tcp sport=62454 dport=3390 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 3390
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 62454
protocol: 6
streamName: meraki
clientIP: 136.219.42.2
serverIP: 108.55.125.169 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1670186232.818147948 M34_MX67C_Atlanta flows src=38.246.156.86 dst=152.80.16.212 protocol=tcp sport=62454 dport=3390 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 3390,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1670186232.818147948 M34_MX67C_Atlanta flows src=38.246.156.86 dst=152.80.16.212 protocol=tcp sport=62454 dport=3390 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 62454,
"protocol": 6,
"streamName": "meraki",
"clientIP": "38.246.156.86",
"serverIP": "152.80.16.212"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1670186232.818147948 M34_MX67C_Atlanta flows src=38.246.156.86 dst=152.80.16.212 protocol=tcp sport=62454 dport=3390 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1670186232.818147948 M34_MX67C_Atlanta flows src=38.246.156.86 dst=152.80.16.212 protocol=tcp sport=62454 dport=3390 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 3390
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 62454
protocol: 6
streamName: meraki
clientIP: 38.246.156.86
serverIP: 152.80.16.212 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1670186232.818147948 M34_MX67C_Atlanta flows src=78.239.154.168 dst=71.190.197.6 protocol=tcp sport=62454 dport=3390 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 3390,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1670186232.818147948 M34_MX67C_Atlanta flows src=78.239.154.168 dst=71.190.197.6 protocol=tcp sport=62454 dport=3390 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 62454,
"protocol": 6,
"streamName": "meraki",
"clientIP": "78.239.154.168",
"serverIP": "71.190.197.6"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1670186232.818147948 M34_MX67C_Atlanta flows src=78.239.154.168 dst=71.190.197.6 protocol=tcp sport=62454 dport=3390 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1670186232.818147948 M34_MX67C_Atlanta flows src=78.239.154.168 dst=71.190.197.6 protocol=tcp sport=62454 dport=3390 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 3390
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 62454
protocol: 6
streamName: meraki
clientIP: 78.239.154.168
serverIP: 71.190.197.6 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1670186232.818147948 M34_MX67C_Atlanta flows src=99.212.222.84 dst=157.85.69.192 protocol=tcp sport=62454 dport=3390 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 3390,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1670186232.818147948 M34_MX67C_Atlanta flows src=99.212.222.84 dst=157.85.69.192 protocol=tcp sport=62454 dport=3390 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 62454,
"protocol": 6,
"streamName": "meraki",
"clientIP": "99.212.222.84",
"serverIP": "157.85.69.192"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1670186232.818147948 M34_MX67C_Atlanta flows src=99.212.222.84 dst=157.85.69.192 protocol=tcp sport=62454 dport=3390 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1670186232.818147948 M34_MX67C_Atlanta flows src=99.212.222.84 dst=157.85.69.192 protocol=tcp sport=62454 dport=3390 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 3390
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 62454
protocol: 6
streamName: meraki
clientIP: 99.212.222.84
serverIP: 157.85.69.192 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1670188937.940248836 M34_MX67C_Atlanta flows src=64.147.250.4 dst=95.120.116.115 protocol=udp sport=5375 dport=5070 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 5070,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1670188937.940248836 M34_MX67C_Atlanta flows src=64.147.250.4 dst=95.120.116.115 protocol=udp sport=5375 dport=5070 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 5375,
"protocol": 17,
"streamName": "meraki",
"clientIP": "64.147.250.4",
"serverIP": "95.120.116.115"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1670188937.940248836 M34_MX67C_Atlanta flows src=64.147.250.4 dst=95.120.116.115 protocol=udp sport=5375 dport=5070 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1670188937.940248836 M34_MX67C_Atlanta flows src=64.147.250.4 dst=95.120.116.115 protocol=udp sport=5375 dport=5070 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5070
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 5375
protocol: 17
streamName: meraki
clientIP: 64.147.250.4
serverIP: 95.120.116.115 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1670188937.940248836 M34_MX67C_Atlanta flows src=176.146.161.179 dst=31.69.111.178 protocol=udp sport=5375 dport=5070 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 5070,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1670188937.940248836 M34_MX67C_Atlanta flows src=176.146.161.179 dst=31.69.111.178 protocol=udp sport=5375 dport=5070 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 5375,
"protocol": 17,
"streamName": "meraki",
"clientIP": "176.146.161.179",
"serverIP": "31.69.111.178"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1670188937.940248836 M34_MX67C_Atlanta flows src=176.146.161.179 dst=31.69.111.178 protocol=udp sport=5375 dport=5070 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1670188937.940248836 M34_MX67C_Atlanta flows src=176.146.161.179 dst=31.69.111.178 protocol=udp sport=5375 dport=5070 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5070
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 5375
protocol: 17
streamName: meraki
clientIP: 176.146.161.179
serverIP: 31.69.111.178 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1670186224.090474428 M34_MX67C_Atlanta flows src=132.171.100.60 dst=245.166.119.23 protocol=icmp type=8 pattern: 1 all | {
"senderhost": "192.168.2.250",
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1670186224.090474428 M34_MX67C_Atlanta flows src=132.171.100.60 dst=245.166.119.23 protocol=icmp type=8 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"protocol": 1,
"streamName": "meraki",
"clientIP": "132.171.100.60",
"serverIP": "245.166.119.23"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1670186224.090474428 M34_MX67C_Atlanta flows src=132.171.100.60 dst=245.166.119.23 protocol=icmp type=8 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1670186224.090474428 M34_MX67C_Atlanta flows src=132.171.100.60 dst=245.166.119.23 protocol=icmp type=8 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
protocol: 1
streamName: meraki
clientIP: 132.171.100.60
serverIP: 245.166.119.23 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1670186224.090474428 M34_MX67C_Atlanta flows src=95.214.130.134 dst=154.63.135.55 protocol=icmp type=8 pattern: 1 all | {
"senderhost": "192.168.2.250",
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1670186224.090474428 M34_MX67C_Atlanta flows src=95.214.130.134 dst=154.63.135.55 protocol=icmp type=8 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"protocol": 1,
"streamName": "meraki",
"clientIP": "95.214.130.134",
"serverIP": "154.63.135.55"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1670186224.090474428 M34_MX67C_Atlanta flows src=95.214.130.134 dst=154.63.135.55 protocol=icmp type=8 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1670186224.090474428 M34_MX67C_Atlanta flows src=95.214.130.134 dst=154.63.135.55 protocol=icmp type=8 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
protocol: 1
streamName: meraki
clientIP: 95.214.130.134
serverIP: 154.63.135.55 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1670186224.090474428 M34_MX67C_Atlanta flows src=208.106.17.13 dst=207.150.47.173 protocol=icmp type=8 pattern: 1 all | {
"senderhost": "192.168.2.250",
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1670186224.090474428 M34_MX67C_Atlanta flows src=208.106.17.13 dst=207.150.47.173 protocol=icmp type=8 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"protocol": 1,
"streamName": "meraki",
"clientIP": "208.106.17.13",
"serverIP": "207.150.47.173"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1670186224.090474428 M34_MX67C_Atlanta flows src=208.106.17.13 dst=207.150.47.173 protocol=icmp type=8 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1670186224.090474428 M34_MX67C_Atlanta flows src=208.106.17.13 dst=207.150.47.173 protocol=icmp type=8 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
protocol: 1
streamName: meraki
clientIP: 208.106.17.13
serverIP: 207.150.47.173 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1670186224.090474428 M34_MX67C_Atlanta flows src=58.80.82.53 dst=252.215.13.250 protocol=icmp type=8 pattern: 1 all | {
"senderhost": "192.168.2.250",
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1670186224.090474428 M34_MX67C_Atlanta flows src=58.80.82.53 dst=252.215.13.250 protocol=icmp type=8 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"protocol": 1,
"streamName": "meraki",
"clientIP": "58.80.82.53",
"serverIP": "252.215.13.250"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1670186224.090474428 M34_MX67C_Atlanta flows src=58.80.82.53 dst=252.215.13.250 protocol=icmp type=8 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1670186224.090474428 M34_MX67C_Atlanta flows src=58.80.82.53 dst=252.215.13.250 protocol=icmp type=8 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
protocol: 1
streamName: meraki
clientIP: 58.80.82.53
serverIP: 252.215.13.250 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1670188937.941837156 M34_MX67C_Atlanta flows src=168.246.51.196 dst=160.176.189.99 protocol=udp sport=5375 dport=5070 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 5070,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1670188937.941837156 M34_MX67C_Atlanta flows src=168.246.51.196 dst=160.176.189.99 protocol=udp sport=5375 dport=5070 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 5375,
"protocol": 17,
"streamName": "meraki",
"clientIP": "168.246.51.196",
"serverIP": "160.176.189.99"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1670188937.941837156 M34_MX67C_Atlanta flows src=168.246.51.196 dst=160.176.189.99 protocol=udp sport=5375 dport=5070 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1670188937.941837156 M34_MX67C_Atlanta flows src=168.246.51.196 dst=160.176.189.99 protocol=udp sport=5375 dport=5070 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5070
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 5375
protocol: 17
streamName: meraki
clientIP: 168.246.51.196
serverIP: 160.176.189.99 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1670188937.941837156 M34_MX67C_Atlanta flows src=29.122.212.210 dst=215.246.168.117 protocol=udp sport=5375 dport=5070 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 5070,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1670188937.941837156 M34_MX67C_Atlanta flows src=29.122.212.210 dst=215.246.168.117 protocol=udp sport=5375 dport=5070 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 5375,
"protocol": 17,
"streamName": "meraki",
"clientIP": "29.122.212.210",
"serverIP": "215.246.168.117"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1670188937.941837156 M34_MX67C_Atlanta flows src=29.122.212.210 dst=215.246.168.117 protocol=udp sport=5375 dport=5070 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1670188937.941837156 M34_MX67C_Atlanta flows src=29.122.212.210 dst=215.246.168.117 protocol=udp sport=5375 dport=5070 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5070
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 5375
protocol: 17
streamName: meraki
clientIP: 29.122.212.210
serverIP: 215.246.168.117 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1670188937.941837156 M34_MX67C_Atlanta flows src=148.124.133.90 dst=92.94.185.244 protocol=udp sport=5375 dport=5070 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 5070,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1670188937.941837156 M34_MX67C_Atlanta flows src=148.124.133.90 dst=92.94.185.244 protocol=udp sport=5375 dport=5070 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 5375,
"protocol": 17,
"streamName": "meraki",
"clientIP": "148.124.133.90",
"serverIP": "92.94.185.244"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1670188937.941837156 M34_MX67C_Atlanta flows src=148.124.133.90 dst=92.94.185.244 protocol=udp sport=5375 dport=5070 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1670188937.941837156 M34_MX67C_Atlanta flows src=148.124.133.90 dst=92.94.185.244 protocol=udp sport=5375 dport=5070 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5070
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 5375
protocol: 17
streamName: meraki
clientIP: 148.124.133.90
serverIP: 92.94.185.244 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1670188937.941837156 M34_MX67C_Atlanta flows src=168.126.6.235 dst=211.13.131.42 protocol=udp sport=5375 dport=5070 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 5070,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1670188937.941837156 M34_MX67C_Atlanta flows src=168.126.6.235 dst=211.13.131.42 protocol=udp sport=5375 dport=5070 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 5375,
"protocol": 17,
"streamName": "meraki",
"clientIP": "168.126.6.235",
"serverIP": "211.13.131.42"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1670188937.941837156 M34_MX67C_Atlanta flows src=168.126.6.235 dst=211.13.131.42 protocol=udp sport=5375 dport=5070 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1670188937.941837156 M34_MX67C_Atlanta flows src=168.126.6.235 dst=211.13.131.42 protocol=udp sport=5375 dport=5070 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5070
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 5375
protocol: 17
streamName: meraki
clientIP: 168.126.6.235
serverIP: 211.13.131.42 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1670046677.901194746 M34_MX67C_Atlanta flows src=176.218.240.168 dst=34.74.170.38 protocol=tcp sport=2869 dport=22 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 22,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1670046677.901194746 M34_MX67C_Atlanta flows src=176.218.240.168 dst=34.74.170.38 protocol=tcp sport=2869 dport=22 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 2869,
"protocol": 6,
"streamName": "meraki",
"clientIP": "176.218.240.168",
"serverIP": "34.74.170.38"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1670046677.901194746 M34_MX67C_Atlanta flows src=176.218.240.168 dst=34.74.170.38 protocol=tcp sport=2869 dport=22 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1670046677.901194746 M34_MX67C_Atlanta flows src=176.218.240.168 dst=34.74.170.38 protocol=tcp sport=2869 dport=22 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 22
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 2869
protocol: 6
streamName: meraki
clientIP: 176.218.240.168
serverIP: 34.74.170.38 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1670046677.901194746 M34_MX67C_Atlanta flows src=107.21.109.159 dst=178.221.48.33 protocol=tcp sport=2869 dport=22 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 22,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1670046677.901194746 M34_MX67C_Atlanta flows src=107.21.109.159 dst=178.221.48.33 protocol=tcp sport=2869 dport=22 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 2869,
"protocol": 6,
"streamName": "meraki",
"clientIP": "107.21.109.159",
"serverIP": "178.221.48.33"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1670046677.901194746 M34_MX67C_Atlanta flows src=107.21.109.159 dst=178.221.48.33 protocol=tcp sport=2869 dport=22 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1670046677.901194746 M34_MX67C_Atlanta flows src=107.21.109.159 dst=178.221.48.33 protocol=tcp sport=2869 dport=22 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 22
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 2869
protocol: 6
streamName: meraki
clientIP: 107.21.109.159
serverIP: 178.221.48.33 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1670046677.901194746 M34_MX67C_Atlanta flows src=140.188.53.160 dst=48.83.199.27 protocol=tcp sport=2869 dport=22 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 22,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1670046677.901194746 M34_MX67C_Atlanta flows src=140.188.53.160 dst=48.83.199.27 protocol=tcp sport=2869 dport=22 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 2869,
"protocol": 6,
"streamName": "meraki",
"clientIP": "140.188.53.160",
"serverIP": "48.83.199.27"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1670046677.901194746 M34_MX67C_Atlanta flows src=140.188.53.160 dst=48.83.199.27 protocol=tcp sport=2869 dport=22 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1670046677.901194746 M34_MX67C_Atlanta flows src=140.188.53.160 dst=48.83.199.27 protocol=tcp sport=2869 dport=22 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 22
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 2869
protocol: 6
streamName: meraki
clientIP: 140.188.53.160
serverIP: 48.83.199.27 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1670046677.901194746 M34_MX67C_Atlanta flows src=246.97.74.202 dst=190.251.158.178 protocol=tcp sport=2869 dport=22 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 22,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1670046677.901194746 M34_MX67C_Atlanta flows src=246.97.74.202 dst=190.251.158.178 protocol=tcp sport=2869 dport=22 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 2869,
"protocol": 6,
"streamName": "meraki",
"clientIP": "246.97.74.202",
"serverIP": "190.251.158.178"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1670046677.901194746 M34_MX67C_Atlanta flows src=246.97.74.202 dst=190.251.158.178 protocol=tcp sport=2869 dport=22 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1670046677.901194746 M34_MX67C_Atlanta flows src=246.97.74.202 dst=190.251.158.178 protocol=tcp sport=2869 dport=22 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 22
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 2869
protocol: 6
streamName: meraki
clientIP: 246.97.74.202
serverIP: 190.251.158.178 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1670100701.302944990 M34_MX67C_Atlanta flows src=166.123.139.25 dst=166.207.158.137 protocol=udp sport=43593 dport=9080 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9080,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1670100701.302944990 M34_MX67C_Atlanta flows src=166.123.139.25 dst=166.207.158.137 protocol=udp sport=43593 dport=9080 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 43593,
"protocol": 17,
"streamName": "meraki",
"clientIP": "166.123.139.25",
"serverIP": "166.207.158.137"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1670100701.302944990 M34_MX67C_Atlanta flows src=166.123.139.25 dst=166.207.158.137 protocol=udp sport=43593 dport=9080 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1670100701.302944990 M34_MX67C_Atlanta flows src=166.123.139.25 dst=166.207.158.137 protocol=udp sport=43593 dport=9080 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9080
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 43593
protocol: 17
streamName: meraki
clientIP: 166.123.139.25
serverIP: 166.207.158.137 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1670100701.302944990 M34_MX67C_Atlanta flows src=148.227.132.221 dst=184.199.204.175 protocol=udp sport=43593 dport=9080 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9080,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1670100701.302944990 M34_MX67C_Atlanta flows src=148.227.132.221 dst=184.199.204.175 protocol=udp sport=43593 dport=9080 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 43593,
"protocol": 17,
"streamName": "meraki",
"clientIP": "148.227.132.221",
"serverIP": "184.199.204.175"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1670100701.302944990 M34_MX67C_Atlanta flows src=148.227.132.221 dst=184.199.204.175 protocol=udp sport=43593 dport=9080 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1670100701.302944990 M34_MX67C_Atlanta flows src=148.227.132.221 dst=184.199.204.175 protocol=udp sport=43593 dport=9080 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9080
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 43593
protocol: 17
streamName: meraki
clientIP: 148.227.132.221
serverIP: 184.199.204.175 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1670100701.302944990 M34_MX67C_Atlanta flows src=238.243.159.65 dst=123.127.105.217 protocol=udp sport=43593 dport=9080 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9080,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1670100701.302944990 M34_MX67C_Atlanta flows src=238.243.159.65 dst=123.127.105.217 protocol=udp sport=43593 dport=9080 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 43593,
"protocol": 17,
"streamName": "meraki",
"clientIP": "238.243.159.65",
"serverIP": "123.127.105.217"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1670100701.302944990 M34_MX67C_Atlanta flows src=238.243.159.65 dst=123.127.105.217 protocol=udp sport=43593 dport=9080 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1670100701.302944990 M34_MX67C_Atlanta flows src=238.243.159.65 dst=123.127.105.217 protocol=udp sport=43593 dport=9080 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9080
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 43593
protocol: 17
streamName: meraki
clientIP: 238.243.159.65
serverIP: 123.127.105.217 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1670100701.302944990 M34_MX67C_Atlanta flows src=111.247.205.84 dst=213.28.60.114 protocol=udp sport=43593 dport=9080 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9080,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1670100701.302944990 M34_MX67C_Atlanta flows src=111.247.205.84 dst=213.28.60.114 protocol=udp sport=43593 dport=9080 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 43593,
"protocol": 17,
"streamName": "meraki",
"clientIP": "111.247.205.84",
"serverIP": "213.28.60.114"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1670100701.302944990 M34_MX67C_Atlanta flows src=111.247.205.84 dst=213.28.60.114 protocol=udp sport=43593 dport=9080 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1670100701.302944990 M34_MX67C_Atlanta flows src=111.247.205.84 dst=213.28.60.114 protocol=udp sport=43593 dport=9080 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9080
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 43593
protocol: 17
streamName: meraki
clientIP: 111.247.205.84
serverIP: 213.28.60.114 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1670188938.469277156 M34_MX67C_Atlanta flows src=9.0.244.236 dst=42.22.18.149 protocol=tcp sport=63708 dport=23 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 23,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1670188938.469277156 M34_MX67C_Atlanta flows src=9.0.244.236 dst=42.22.18.149 protocol=tcp sport=63708 dport=23 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 63708,
"protocol": 6,
"streamName": "meraki",
"clientIP": "9.0.244.236",
"serverIP": "42.22.18.149"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1670188938.469277156 M34_MX67C_Atlanta flows src=9.0.244.236 dst=42.22.18.149 protocol=tcp sport=63708 dport=23 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1670188938.469277156 M34_MX67C_Atlanta flows src=9.0.244.236 dst=42.22.18.149 protocol=tcp sport=63708 dport=23 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 23
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 63708
protocol: 6
streamName: meraki
clientIP: 9.0.244.236
serverIP: 42.22.18.149 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1670188938.469277156 M34_MX67C_Atlanta flows src=231.32.254.222 dst=69.218.142.120 protocol=tcp sport=63708 dport=23 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 23,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1670188938.469277156 M34_MX67C_Atlanta flows src=231.32.254.222 dst=69.218.142.120 protocol=tcp sport=63708 dport=23 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 63708,
"protocol": 6,
"streamName": "meraki",
"clientIP": "231.32.254.222",
"serverIP": "69.218.142.120"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1670188938.469277156 M34_MX67C_Atlanta flows src=231.32.254.222 dst=69.218.142.120 protocol=tcp sport=63708 dport=23 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1670188938.469277156 M34_MX67C_Atlanta flows src=231.32.254.222 dst=69.218.142.120 protocol=tcp sport=63708 dport=23 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 23
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 63708
protocol: 6
streamName: meraki
clientIP: 231.32.254.222
serverIP: 69.218.142.120 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1670188938.469277156 M34_MX67C_Atlanta flows src=90.54.106.67 dst=58.167.233.201 protocol=tcp sport=63708 dport=23 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 23,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1670188938.469277156 M34_MX67C_Atlanta flows src=90.54.106.67 dst=58.167.233.201 protocol=tcp sport=63708 dport=23 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 63708,
"protocol": 6,
"streamName": "meraki",
"clientIP": "90.54.106.67",
"serverIP": "58.167.233.201"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1670188938.469277156 M34_MX67C_Atlanta flows src=90.54.106.67 dst=58.167.233.201 protocol=tcp sport=63708 dport=23 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1670188938.469277156 M34_MX67C_Atlanta flows src=90.54.106.67 dst=58.167.233.201 protocol=tcp sport=63708 dport=23 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 23
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 63708
protocol: 6
streamName: meraki
clientIP: 90.54.106.67
serverIP: 58.167.233.201 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1670188938.469277156 M34_MX67C_Atlanta flows src=55.236.123.166 dst=108.186.5.140 protocol=tcp sport=63708 dport=23 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 23,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1670188938.469277156 M34_MX67C_Atlanta flows src=55.236.123.166 dst=108.186.5.140 protocol=tcp sport=63708 dport=23 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 63708,
"protocol": 6,
"streamName": "meraki",
"clientIP": "55.236.123.166",
"serverIP": "108.186.5.140"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1670188938.469277156 M34_MX67C_Atlanta flows src=55.236.123.166 dst=108.186.5.140 protocol=tcp sport=63708 dport=23 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1670188938.469277156 M34_MX67C_Atlanta flows src=55.236.123.166 dst=108.186.5.140 protocol=tcp sport=63708 dport=23 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 23
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 63708
protocol: 6
streamName: meraki
clientIP: 55.236.123.166
serverIP: 108.186.5.140 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655768259.749759716 NORDC_MX400_1 flows src=73.244.163.241 dst=36.140.163.15 protocol=tcp sport=34322 dport=23 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 23,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655768259.749759716 NORDC_MX400_1 flows src=73.244.163.241 dst=36.140.163.15 protocol=tcp sport=34322 dport=23 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 34322,
"protocol": 6,
"streamName": "meraki",
"clientIP": "73.244.163.241",
"serverIP": "36.140.163.15"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655768259.749759716 NORDC_MX400_1 flows src=73.244.163.241 dst=36.140.163.15 protocol=tcp sport=34322 dport=23 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655768259.749759716 NORDC_MX400_1 flows src=73.244.163.241 dst=36.140.163.15 protocol=tcp sport=34322 dport=23 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 23
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 34322
protocol: 6
streamName: meraki
clientIP: 73.244.163.241
serverIP: 36.140.163.15 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655768259.749759716 NORDC_MX400_1 flows src=45.1.65.235 dst=145.141.117.66 protocol=tcp sport=34322 dport=23 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 23,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655768259.749759716 NORDC_MX400_1 flows src=45.1.65.235 dst=145.141.117.66 protocol=tcp sport=34322 dport=23 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 34322,
"protocol": 6,
"streamName": "meraki",
"clientIP": "45.1.65.235",
"serverIP": "145.141.117.66"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655768259.749759716 NORDC_MX400_1 flows src=45.1.65.235 dst=145.141.117.66 protocol=tcp sport=34322 dport=23 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655768259.749759716 NORDC_MX400_1 flows src=45.1.65.235 dst=145.141.117.66 protocol=tcp sport=34322 dport=23 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 23
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 34322
protocol: 6
streamName: meraki
clientIP: 45.1.65.235
serverIP: 145.141.117.66 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655768259.749759716 NORDC_MX400_1 flows src=184.207.157.159 dst=79.22.48.180 protocol=tcp sport=34322 dport=23 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 23,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655768259.749759716 NORDC_MX400_1 flows src=184.207.157.159 dst=79.22.48.180 protocol=tcp sport=34322 dport=23 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 34322,
"protocol": 6,
"streamName": "meraki",
"clientIP": "184.207.157.159",
"serverIP": "79.22.48.180"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655768259.749759716 NORDC_MX400_1 flows src=184.207.157.159 dst=79.22.48.180 protocol=tcp sport=34322 dport=23 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655768259.749759716 NORDC_MX400_1 flows src=184.207.157.159 dst=79.22.48.180 protocol=tcp sport=34322 dport=23 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 23
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 34322
protocol: 6
streamName: meraki
clientIP: 184.207.157.159
serverIP: 79.22.48.180 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655768259.749759716 NORDC_MX400_1 flows src=71.238.109.218 dst=228.39.247.151 protocol=tcp sport=34322 dport=23 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 23,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655768259.749759716 NORDC_MX400_1 flows src=71.238.109.218 dst=228.39.247.151 protocol=tcp sport=34322 dport=23 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 34322,
"protocol": 6,
"streamName": "meraki",
"clientIP": "71.238.109.218",
"serverIP": "228.39.247.151"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655768259.749759716 NORDC_MX400_1 flows src=71.238.109.218 dst=228.39.247.151 protocol=tcp sport=34322 dport=23 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655768259.749759716 NORDC_MX400_1 flows src=71.238.109.218 dst=228.39.247.151 protocol=tcp sport=34322 dport=23 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 23
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 34322
protocol: 6
streamName: meraki
clientIP: 71.238.109.218
serverIP: 228.39.247.151 | Explain this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.