input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<134>Original Address=54.150.229.255 1 1659594770.996131063 M52_MX67C_Loxley flows src=115.4.234.40 dst=54.150.229.255 protocol=tcp sport=45012 dport=81 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 81,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=54.150.229.255 1 1659594770.996131063 M52_MX67C_Loxley flows src=115.4.234.40 dst=54.150.229.255 protocol=tcp sport=45012 dport=81 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 45012,
"protocol": 6,
"streamName": "meraki",
"clientIP": "115.4.234.40",
"serverIP": "54.150.229.255"
} | Create a JSON artifact from the message |
<134>Original Address=54.150.229.255 1 1659594770.996131063 M52_MX67C_Loxley flows src=115.4.234.40 dst=54.150.229.255 protocol=tcp sport=45012 dport=81 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=54.150.229.255 1 1659594770.996131063 M52_MX67C_Loxley flows src=115.4.234.40 dst=54.150.229.255 protocol=tcp sport=45012 dport=81 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 81
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 45012
protocol: 6
streamName: meraki
clientIP: 115.4.234.40
serverIP: 54.150.229.255 | Explain this syslog message |
<134>Original Address=215.137.152.251 1 1659594770.996131063 M52_MX67C_Loxley flows src=7.102.20.27 dst=215.137.152.251 protocol=tcp sport=45012 dport=81 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 81,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=215.137.152.251 1 1659594770.996131063 M52_MX67C_Loxley flows src=7.102.20.27 dst=215.137.152.251 protocol=tcp sport=45012 dport=81 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 45012,
"protocol": 6,
"streamName": "meraki",
"clientIP": "7.102.20.27",
"serverIP": "215.137.152.251"
} | Create a JSON artifact from the message |
<134>Original Address=215.137.152.251 1 1659594770.996131063 M52_MX67C_Loxley flows src=7.102.20.27 dst=215.137.152.251 protocol=tcp sport=45012 dport=81 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=215.137.152.251 1 1659594770.996131063 M52_MX67C_Loxley flows src=7.102.20.27 dst=215.137.152.251 protocol=tcp sport=45012 dport=81 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 81
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 45012
protocol: 6
streamName: meraki
clientIP: 7.102.20.27
serverIP: 215.137.152.251 | Explain this syslog message |
<134>Original Address=33.189.216.11 1 1659594770.996131063 M52_MX67C_Loxley flows src=227.1.33.175 dst=33.189.216.11 protocol=tcp sport=45012 dport=81 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 81,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=33.189.216.11 1 1659594770.996131063 M52_MX67C_Loxley flows src=227.1.33.175 dst=33.189.216.11 protocol=tcp sport=45012 dport=81 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 45012,
"protocol": 6,
"streamName": "meraki",
"clientIP": "227.1.33.175",
"serverIP": "33.189.216.11"
} | Create a JSON artifact from the message |
<134>Original Address=33.189.216.11 1 1659594770.996131063 M52_MX67C_Loxley flows src=227.1.33.175 dst=33.189.216.11 protocol=tcp sport=45012 dport=81 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=33.189.216.11 1 1659594770.996131063 M52_MX67C_Loxley flows src=227.1.33.175 dst=33.189.216.11 protocol=tcp sport=45012 dport=81 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 81
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 45012
protocol: 6
streamName: meraki
clientIP: 227.1.33.175
serverIP: 33.189.216.11 | Explain this syslog message |
<134>Original Address=47.0.105.181 1 1659594770.996131063 M52_MX67C_Loxley flows src=1.176.104.199 dst=47.0.105.181 protocol=tcp sport=45012 dport=81 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 81,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=47.0.105.181 1 1659594770.996131063 M52_MX67C_Loxley flows src=1.176.104.199 dst=47.0.105.181 protocol=tcp sport=45012 dport=81 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 45012,
"protocol": 6,
"streamName": "meraki",
"clientIP": "1.176.104.199",
"serverIP": "47.0.105.181"
} | Create a JSON artifact from the message |
<134>Original Address=47.0.105.181 1 1659594770.996131063 M52_MX67C_Loxley flows src=1.176.104.199 dst=47.0.105.181 protocol=tcp sport=45012 dport=81 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=47.0.105.181 1 1659594770.996131063 M52_MX67C_Loxley flows src=1.176.104.199 dst=47.0.105.181 protocol=tcp sport=45012 dport=81 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 81
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 45012
protocol: 6
streamName: meraki
clientIP: 1.176.104.199
serverIP: 47.0.105.181 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655117974.746619793 NORDC_MX400_1 flows src=118.51.70.34 dst=68.38.76.121 protocol=tcp sport=28513 dport=25 pattern: 1 dst 68.38.76.121 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655117974.746619793 NORDC_MX400_1 flows src=118.51.70.34 dst=68.38.76.121 protocol=tcp sport=28513 dport=25 pattern: 1 dst 68.38.76.121",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 28513,
"protocol": 6,
"streamName": "meraki",
"clientIP": "118.51.70.34",
"serverIP": "68.38.76.121"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655117974.746619793 NORDC_MX400_1 flows src=118.51.70.34 dst=68.38.76.121 protocol=tcp sport=28513 dport=25 pattern: 1 dst 68.38.76.121 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655117974.746619793 NORDC_MX400_1 flows src=118.51.70.34 dst=68.38.76.121 protocol=tcp sport=28513 dport=25 pattern: 1 dst 68.38.76.121 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 28513
protocol: 6
streamName: meraki
clientIP: 118.51.70.34
serverIP: 68.38.76.121 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655117974.746619793 NORDC_MX400_1 flows src=203.177.44.180 dst=107.63.215.176 protocol=tcp sport=28513 dport=25 pattern: 1 dst 107.63.215.176 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655117974.746619793 NORDC_MX400_1 flows src=203.177.44.180 dst=107.63.215.176 protocol=tcp sport=28513 dport=25 pattern: 1 dst 107.63.215.176",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 28513,
"protocol": 6,
"streamName": "meraki",
"clientIP": "203.177.44.180",
"serverIP": "107.63.215.176"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655117974.746619793 NORDC_MX400_1 flows src=203.177.44.180 dst=107.63.215.176 protocol=tcp sport=28513 dport=25 pattern: 1 dst 107.63.215.176 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655117974.746619793 NORDC_MX400_1 flows src=203.177.44.180 dst=107.63.215.176 protocol=tcp sport=28513 dport=25 pattern: 1 dst 107.63.215.176 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 28513
protocol: 6
streamName: meraki
clientIP: 203.177.44.180
serverIP: 107.63.215.176 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655117974.507782782 NORDC_MX400_1 flows src=222.24.202.247 dst=252.184.231.137 protocol=tcp sport=23651 dport=25 pattern: 1 dst 252.184.231.137 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655117974.507782782 NORDC_MX400_1 flows src=222.24.202.247 dst=252.184.231.137 protocol=tcp sport=23651 dport=25 pattern: 1 dst 252.184.231.137",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 23651,
"protocol": 6,
"streamName": "meraki",
"clientIP": "222.24.202.247",
"serverIP": "252.184.231.137"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655117974.507782782 NORDC_MX400_1 flows src=222.24.202.247 dst=252.184.231.137 protocol=tcp sport=23651 dport=25 pattern: 1 dst 252.184.231.137 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655117974.507782782 NORDC_MX400_1 flows src=222.24.202.247 dst=252.184.231.137 protocol=tcp sport=23651 dport=25 pattern: 1 dst 252.184.231.137 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 23651
protocol: 6
streamName: meraki
clientIP: 222.24.202.247
serverIP: 252.184.231.137 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655117974.507782782 NORDC_MX400_1 flows src=101.211.113.133 dst=231.34.243.110 protocol=tcp sport=23651 dport=25 pattern: 1 dst 231.34.243.110 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655117974.507782782 NORDC_MX400_1 flows src=101.211.113.133 dst=231.34.243.110 protocol=tcp sport=23651 dport=25 pattern: 1 dst 231.34.243.110",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 23651,
"protocol": 6,
"streamName": "meraki",
"clientIP": "101.211.113.133",
"serverIP": "231.34.243.110"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655117974.507782782 NORDC_MX400_1 flows src=101.211.113.133 dst=231.34.243.110 protocol=tcp sport=23651 dport=25 pattern: 1 dst 231.34.243.110 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655117974.507782782 NORDC_MX400_1 flows src=101.211.113.133 dst=231.34.243.110 protocol=tcp sport=23651 dport=25 pattern: 1 dst 231.34.243.110 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 23651
protocol: 6
streamName: meraki
clientIP: 101.211.113.133
serverIP: 231.34.243.110 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655117974.690591640 NORDC_MX400_1 flows src=116.80.61.14 dst=72.255.224.234 protocol=tcp sport=36253 dport=25 pattern: 1 dst 72.255.224.234 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655117974.690591640 NORDC_MX400_1 flows src=116.80.61.14 dst=72.255.224.234 protocol=tcp sport=36253 dport=25 pattern: 1 dst 72.255.224.234",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 36253,
"protocol": 6,
"streamName": "meraki",
"clientIP": "116.80.61.14",
"serverIP": "72.255.224.234"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655117974.690591640 NORDC_MX400_1 flows src=116.80.61.14 dst=72.255.224.234 protocol=tcp sport=36253 dport=25 pattern: 1 dst 72.255.224.234 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655117974.690591640 NORDC_MX400_1 flows src=116.80.61.14 dst=72.255.224.234 protocol=tcp sport=36253 dport=25 pattern: 1 dst 72.255.224.234 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 36253
protocol: 6
streamName: meraki
clientIP: 116.80.61.14
serverIP: 72.255.224.234 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655117974.690591640 NORDC_MX400_1 flows src=90.229.129.208 dst=67.229.195.237 protocol=tcp sport=36253 dport=25 pattern: 1 dst 67.229.195.237 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655117974.690591640 NORDC_MX400_1 flows src=90.229.129.208 dst=67.229.195.237 protocol=tcp sport=36253 dport=25 pattern: 1 dst 67.229.195.237",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 36253,
"protocol": 6,
"streamName": "meraki",
"clientIP": "90.229.129.208",
"serverIP": "67.229.195.237"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655117974.690591640 NORDC_MX400_1 flows src=90.229.129.208 dst=67.229.195.237 protocol=tcp sport=36253 dport=25 pattern: 1 dst 67.229.195.237 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655117974.690591640 NORDC_MX400_1 flows src=90.229.129.208 dst=67.229.195.237 protocol=tcp sport=36253 dport=25 pattern: 1 dst 67.229.195.237 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 36253
protocol: 6
streamName: meraki
clientIP: 90.229.129.208
serverIP: 67.229.195.237 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655117974.746619793 NORDC_MX400_1 flows src=119.170.5.35 dst=87.202.223.116 protocol=tcp sport=28513 dport=25 pattern: 1 dst 87.202.223.116 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655117974.746619793 NORDC_MX400_1 flows src=119.170.5.35 dst=87.202.223.116 protocol=tcp sport=28513 dport=25 pattern: 1 dst 87.202.223.116",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 28513,
"protocol": 6,
"streamName": "meraki",
"clientIP": "119.170.5.35",
"serverIP": "87.202.223.116"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655117974.746619793 NORDC_MX400_1 flows src=119.170.5.35 dst=87.202.223.116 protocol=tcp sport=28513 dport=25 pattern: 1 dst 87.202.223.116 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655117974.746619793 NORDC_MX400_1 flows src=119.170.5.35 dst=87.202.223.116 protocol=tcp sport=28513 dport=25 pattern: 1 dst 87.202.223.116 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 28513
protocol: 6
streamName: meraki
clientIP: 119.170.5.35
serverIP: 87.202.223.116 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655117974.746619793 NORDC_MX400_1 flows src=212.172.89.115 dst=37.115.98.6 protocol=tcp sport=28513 dport=25 pattern: 1 dst 37.115.98.6 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655117974.746619793 NORDC_MX400_1 flows src=212.172.89.115 dst=37.115.98.6 protocol=tcp sport=28513 dport=25 pattern: 1 dst 37.115.98.6",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 28513,
"protocol": 6,
"streamName": "meraki",
"clientIP": "212.172.89.115",
"serverIP": "37.115.98.6"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655117974.746619793 NORDC_MX400_1 flows src=212.172.89.115 dst=37.115.98.6 protocol=tcp sport=28513 dport=25 pattern: 1 dst 37.115.98.6 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655117974.746619793 NORDC_MX400_1 flows src=212.172.89.115 dst=37.115.98.6 protocol=tcp sport=28513 dport=25 pattern: 1 dst 37.115.98.6 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 28513
protocol: 6
streamName: meraki
clientIP: 212.172.89.115
serverIP: 37.115.98.6 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655117975.137038728 NORDC_MX400_1 flows src=53.237.72.198 dst=102.174.79.119 protocol=tcp sport=6355 dport=25 pattern: 1 dst 102.174.79.119 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655117975.137038728 NORDC_MX400_1 flows src=53.237.72.198 dst=102.174.79.119 protocol=tcp sport=6355 dport=25 pattern: 1 dst 102.174.79.119",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6355,
"protocol": 6,
"streamName": "meraki",
"clientIP": "53.237.72.198",
"serverIP": "102.174.79.119"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655117975.137038728 NORDC_MX400_1 flows src=53.237.72.198 dst=102.174.79.119 protocol=tcp sport=6355 dport=25 pattern: 1 dst 102.174.79.119 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655117975.137038728 NORDC_MX400_1 flows src=53.237.72.198 dst=102.174.79.119 protocol=tcp sport=6355 dport=25 pattern: 1 dst 102.174.79.119 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6355
protocol: 6
streamName: meraki
clientIP: 53.237.72.198
serverIP: 102.174.79.119 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655117975.137038728 NORDC_MX400_1 flows src=6.100.49.18 dst=190.161.91.192 protocol=tcp sport=6355 dport=25 pattern: 1 dst 190.161.91.192 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655117975.137038728 NORDC_MX400_1 flows src=6.100.49.18 dst=190.161.91.192 protocol=tcp sport=6355 dport=25 pattern: 1 dst 190.161.91.192",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6355,
"protocol": 6,
"streamName": "meraki",
"clientIP": "6.100.49.18",
"serverIP": "190.161.91.192"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655117975.137038728 NORDC_MX400_1 flows src=6.100.49.18 dst=190.161.91.192 protocol=tcp sport=6355 dport=25 pattern: 1 dst 190.161.91.192 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655117975.137038728 NORDC_MX400_1 flows src=6.100.49.18 dst=190.161.91.192 protocol=tcp sport=6355 dport=25 pattern: 1 dst 190.161.91.192 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6355
protocol: 6
streamName: meraki
clientIP: 6.100.49.18
serverIP: 190.161.91.192 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655117975.157792875 NORDC_MX400_1 flows src=214.228.86.193 dst=200.150.140.45 protocol=tcp sport=9492 dport=25 pattern: 1 dst 200.150.140.45 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655117975.157792875 NORDC_MX400_1 flows src=214.228.86.193 dst=200.150.140.45 protocol=tcp sport=9492 dport=25 pattern: 1 dst 200.150.140.45",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 9492,
"protocol": 6,
"streamName": "meraki",
"clientIP": "214.228.86.193",
"serverIP": "200.150.140.45"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655117975.157792875 NORDC_MX400_1 flows src=214.228.86.193 dst=200.150.140.45 protocol=tcp sport=9492 dport=25 pattern: 1 dst 200.150.140.45 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655117975.157792875 NORDC_MX400_1 flows src=214.228.86.193 dst=200.150.140.45 protocol=tcp sport=9492 dport=25 pattern: 1 dst 200.150.140.45 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 9492
protocol: 6
streamName: meraki
clientIP: 214.228.86.193
serverIP: 200.150.140.45 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655117975.157792875 NORDC_MX400_1 flows src=88.65.60.81 dst=58.221.9.250 protocol=tcp sport=9492 dport=25 pattern: 1 dst 58.221.9.250 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655117975.157792875 NORDC_MX400_1 flows src=88.65.60.81 dst=58.221.9.250 protocol=tcp sport=9492 dport=25 pattern: 1 dst 58.221.9.250",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 9492,
"protocol": 6,
"streamName": "meraki",
"clientIP": "88.65.60.81",
"serverIP": "58.221.9.250"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655117975.157792875 NORDC_MX400_1 flows src=88.65.60.81 dst=58.221.9.250 protocol=tcp sport=9492 dport=25 pattern: 1 dst 58.221.9.250 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655117975.157792875 NORDC_MX400_1 flows src=88.65.60.81 dst=58.221.9.250 protocol=tcp sport=9492 dport=25 pattern: 1 dst 58.221.9.250 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 9492
protocol: 6
streamName: meraki
clientIP: 88.65.60.81
serverIP: 58.221.9.250 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655117975.201180950 NORDC_MX400_1 flows src=251.132.63.32 dst=3.8.163.74 protocol=tcp sport=36253 dport=25 pattern: 1 dst 3.8.163.74 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655117975.201180950 NORDC_MX400_1 flows src=251.132.63.32 dst=3.8.163.74 protocol=tcp sport=36253 dport=25 pattern: 1 dst 3.8.163.74",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 36253,
"protocol": 6,
"streamName": "meraki",
"clientIP": "251.132.63.32",
"serverIP": "3.8.163.74"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655117975.201180950 NORDC_MX400_1 flows src=251.132.63.32 dst=3.8.163.74 protocol=tcp sport=36253 dport=25 pattern: 1 dst 3.8.163.74 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655117975.201180950 NORDC_MX400_1 flows src=251.132.63.32 dst=3.8.163.74 protocol=tcp sport=36253 dport=25 pattern: 1 dst 3.8.163.74 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 36253
protocol: 6
streamName: meraki
clientIP: 251.132.63.32
serverIP: 3.8.163.74 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655117975.201180950 NORDC_MX400_1 flows src=243.209.198.150 dst=204.187.167.199 protocol=tcp sport=36253 dport=25 pattern: 1 dst 204.187.167.199 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655117975.201180950 NORDC_MX400_1 flows src=243.209.198.150 dst=204.187.167.199 protocol=tcp sport=36253 dport=25 pattern: 1 dst 204.187.167.199",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 36253,
"protocol": 6,
"streamName": "meraki",
"clientIP": "243.209.198.150",
"serverIP": "204.187.167.199"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655117975.201180950 NORDC_MX400_1 flows src=243.209.198.150 dst=204.187.167.199 protocol=tcp sport=36253 dport=25 pattern: 1 dst 204.187.167.199 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655117975.201180950 NORDC_MX400_1 flows src=243.209.198.150 dst=204.187.167.199 protocol=tcp sport=36253 dport=25 pattern: 1 dst 204.187.167.199 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 36253
protocol: 6
streamName: meraki
clientIP: 243.209.198.150
serverIP: 204.187.167.199 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655117975.237814223 NORDC_MX400_1 flows src=78.117.33.197 dst=86.127.81.216 protocol=tcp sport=6250 dport=25 pattern: 1 dst 86.127.81.216 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655117975.237814223 NORDC_MX400_1 flows src=78.117.33.197 dst=86.127.81.216 protocol=tcp sport=6250 dport=25 pattern: 1 dst 86.127.81.216",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6250,
"protocol": 6,
"streamName": "meraki",
"clientIP": "78.117.33.197",
"serverIP": "86.127.81.216"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655117975.237814223 NORDC_MX400_1 flows src=78.117.33.197 dst=86.127.81.216 protocol=tcp sport=6250 dport=25 pattern: 1 dst 86.127.81.216 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655117975.237814223 NORDC_MX400_1 flows src=78.117.33.197 dst=86.127.81.216 protocol=tcp sport=6250 dport=25 pattern: 1 dst 86.127.81.216 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6250
protocol: 6
streamName: meraki
clientIP: 78.117.33.197
serverIP: 86.127.81.216 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655117975.237814223 NORDC_MX400_1 flows src=48.19.145.123 dst=74.182.149.56 protocol=tcp sport=6250 dport=25 pattern: 1 dst 74.182.149.56 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655117975.237814223 NORDC_MX400_1 flows src=48.19.145.123 dst=74.182.149.56 protocol=tcp sport=6250 dport=25 pattern: 1 dst 74.182.149.56",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6250,
"protocol": 6,
"streamName": "meraki",
"clientIP": "48.19.145.123",
"serverIP": "74.182.149.56"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655117975.237814223 NORDC_MX400_1 flows src=48.19.145.123 dst=74.182.149.56 protocol=tcp sport=6250 dport=25 pattern: 1 dst 74.182.149.56 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655117975.237814223 NORDC_MX400_1 flows src=48.19.145.123 dst=74.182.149.56 protocol=tcp sport=6250 dport=25 pattern: 1 dst 74.182.149.56 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6250
protocol: 6
streamName: meraki
clientIP: 48.19.145.123
serverIP: 74.182.149.56 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655117975.543142500 NORDC_MX400_1 flows src=36.187.198.220 dst=189.164.53.136 protocol=tcp sport=60801 dport=25 pattern: 1 dst 189.164.53.136 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655117975.543142500 NORDC_MX400_1 flows src=36.187.198.220 dst=189.164.53.136 protocol=tcp sport=60801 dport=25 pattern: 1 dst 189.164.53.136",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 60801,
"protocol": 6,
"streamName": "meraki",
"clientIP": "36.187.198.220",
"serverIP": "189.164.53.136"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655117975.543142500 NORDC_MX400_1 flows src=36.187.198.220 dst=189.164.53.136 protocol=tcp sport=60801 dport=25 pattern: 1 dst 189.164.53.136 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655117975.543142500 NORDC_MX400_1 flows src=36.187.198.220 dst=189.164.53.136 protocol=tcp sport=60801 dport=25 pattern: 1 dst 189.164.53.136 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 60801
protocol: 6
streamName: meraki
clientIP: 36.187.198.220
serverIP: 189.164.53.136 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655117975.543142500 NORDC_MX400_1 flows src=4.150.4.190 dst=65.143.185.41 protocol=tcp sport=60801 dport=25 pattern: 1 dst 65.143.185.41 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655117975.543142500 NORDC_MX400_1 flows src=4.150.4.190 dst=65.143.185.41 protocol=tcp sport=60801 dport=25 pattern: 1 dst 65.143.185.41",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 60801,
"protocol": 6,
"streamName": "meraki",
"clientIP": "4.150.4.190",
"serverIP": "65.143.185.41"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655117975.543142500 NORDC_MX400_1 flows src=4.150.4.190 dst=65.143.185.41 protocol=tcp sport=60801 dport=25 pattern: 1 dst 65.143.185.41 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655117975.543142500 NORDC_MX400_1 flows src=4.150.4.190 dst=65.143.185.41 protocol=tcp sport=60801 dport=25 pattern: 1 dst 65.143.185.41 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 60801
protocol: 6
streamName: meraki
clientIP: 4.150.4.190
serverIP: 65.143.185.41 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655117975.576386210 NORDC_MX400_1 flows src=45.162.13.204 dst=71.144.96.59 protocol=tcp sport=37931 dport=1688 pattern: 1 dst 71.144.96.59 | {
"senderhost": "192.168.2.250",
"serverport": 1688,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655117975.576386210 NORDC_MX400_1 flows src=45.162.13.204 dst=71.144.96.59 protocol=tcp sport=37931 dport=1688 pattern: 1 dst 71.144.96.59",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 37931,
"protocol": 6,
"streamName": "meraki",
"clientIP": "45.162.13.204",
"serverIP": "71.144.96.59"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655117975.576386210 NORDC_MX400_1 flows src=45.162.13.204 dst=71.144.96.59 protocol=tcp sport=37931 dport=1688 pattern: 1 dst 71.144.96.59 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655117975.576386210 NORDC_MX400_1 flows src=45.162.13.204 dst=71.144.96.59 protocol=tcp sport=37931 dport=1688 pattern: 1 dst 71.144.96.59 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 1688
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 37931
protocol: 6
streamName: meraki
clientIP: 45.162.13.204
serverIP: 71.144.96.59 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655117975.576386210 NORDC_MX400_1 flows src=165.130.67.236 dst=177.163.82.252 protocol=tcp sport=37931 dport=1688 pattern: 1 dst 177.163.82.252 | {
"senderhost": "192.168.2.250",
"serverport": 1688,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655117975.576386210 NORDC_MX400_1 flows src=165.130.67.236 dst=177.163.82.252 protocol=tcp sport=37931 dport=1688 pattern: 1 dst 177.163.82.252",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 37931,
"protocol": 6,
"streamName": "meraki",
"clientIP": "165.130.67.236",
"serverIP": "177.163.82.252"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655117975.576386210 NORDC_MX400_1 flows src=165.130.67.236 dst=177.163.82.252 protocol=tcp sport=37931 dport=1688 pattern: 1 dst 177.163.82.252 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655117975.576386210 NORDC_MX400_1 flows src=165.130.67.236 dst=177.163.82.252 protocol=tcp sport=37931 dport=1688 pattern: 1 dst 177.163.82.252 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 1688
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 37931
protocol: 6
streamName: meraki
clientIP: 165.130.67.236
serverIP: 177.163.82.252 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655117975.634567383 NORDC_MX400_1 flows src=96.204.192.204 dst=88.236.54.8 protocol=tcp sport=9952 dport=25 pattern: 1 dst 88.236.54.8 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655117975.634567383 NORDC_MX400_1 flows src=96.204.192.204 dst=88.236.54.8 protocol=tcp sport=9952 dport=25 pattern: 1 dst 88.236.54.8",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 9952,
"protocol": 6,
"streamName": "meraki",
"clientIP": "96.204.192.204",
"serverIP": "88.236.54.8"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655117975.634567383 NORDC_MX400_1 flows src=96.204.192.204 dst=88.236.54.8 protocol=tcp sport=9952 dport=25 pattern: 1 dst 88.236.54.8 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655117975.634567383 NORDC_MX400_1 flows src=96.204.192.204 dst=88.236.54.8 protocol=tcp sport=9952 dport=25 pattern: 1 dst 88.236.54.8 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 9952
protocol: 6
streamName: meraki
clientIP: 96.204.192.204
serverIP: 88.236.54.8 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655117975.634567383 NORDC_MX400_1 flows src=34.2.122.122 dst=22.180.237.221 protocol=tcp sport=9952 dport=25 pattern: 1 dst 22.180.237.221 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655117975.634567383 NORDC_MX400_1 flows src=34.2.122.122 dst=22.180.237.221 protocol=tcp sport=9952 dport=25 pattern: 1 dst 22.180.237.221",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 9952,
"protocol": 6,
"streamName": "meraki",
"clientIP": "34.2.122.122",
"serverIP": "22.180.237.221"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655117975.634567383 NORDC_MX400_1 flows src=34.2.122.122 dst=22.180.237.221 protocol=tcp sport=9952 dport=25 pattern: 1 dst 22.180.237.221 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655117975.634567383 NORDC_MX400_1 flows src=34.2.122.122 dst=22.180.237.221 protocol=tcp sport=9952 dport=25 pattern: 1 dst 22.180.237.221 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 9952
protocol: 6
streamName: meraki
clientIP: 34.2.122.122
serverIP: 22.180.237.221 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655117975.646727209 NORDC_MX400_1 flows src=11.219.251.197 dst=210.140.8.145 protocol=udp sport=4104 dport=4104 pattern: 1 dst 210.140.8.145 | {
"senderhost": "192.168.2.250",
"serverport": 4104,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655117975.646727209 NORDC_MX400_1 flows src=11.219.251.197 dst=210.140.8.145 protocol=udp sport=4104 dport=4104 pattern: 1 dst 210.140.8.145",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 4104,
"protocol": 17,
"streamName": "meraki",
"clientIP": "210.140.8.145",
"serverIP": "11.219.251.197"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655117975.646727209 NORDC_MX400_1 flows src=11.219.251.197 dst=210.140.8.145 protocol=udp sport=4104 dport=4104 pattern: 1 dst 210.140.8.145 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655117975.646727209 NORDC_MX400_1 flows src=11.219.251.197 dst=210.140.8.145 protocol=udp sport=4104 dport=4104 pattern: 1 dst 210.140.8.145 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 4104
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 4104
protocol: 17
streamName: meraki
clientIP: 210.140.8.145
serverIP: 11.219.251.197 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655117975.646727209 NORDC_MX400_1 flows src=53.94.242.5 dst=69.250.35.245 protocol=udp sport=4104 dport=4104 pattern: 1 dst 69.250.35.245 | {
"senderhost": "192.168.2.250",
"serverport": 4104,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655117975.646727209 NORDC_MX400_1 flows src=53.94.242.5 dst=69.250.35.245 protocol=udp sport=4104 dport=4104 pattern: 1 dst 69.250.35.245",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 4104,
"protocol": 17,
"streamName": "meraki",
"clientIP": "69.250.35.245",
"serverIP": "53.94.242.5"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655117975.646727209 NORDC_MX400_1 flows src=53.94.242.5 dst=69.250.35.245 protocol=udp sport=4104 dport=4104 pattern: 1 dst 69.250.35.245 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655117975.646727209 NORDC_MX400_1 flows src=53.94.242.5 dst=69.250.35.245 protocol=udp sport=4104 dport=4104 pattern: 1 dst 69.250.35.245 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 4104
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 4104
protocol: 17
streamName: meraki
clientIP: 69.250.35.245
serverIP: 53.94.242.5 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655117975.732139841 NORDC_MX400_1 flows src=71.210.245.126 dst=123.79.190.136 protocol=tcp sport=41952 dport=25 pattern: 1 dst 123.79.190.136 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655117975.732139841 NORDC_MX400_1 flows src=71.210.245.126 dst=123.79.190.136 protocol=tcp sport=41952 dport=25 pattern: 1 dst 123.79.190.136",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 41952,
"protocol": 6,
"streamName": "meraki",
"clientIP": "71.210.245.126",
"serverIP": "123.79.190.136"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655117975.732139841 NORDC_MX400_1 flows src=71.210.245.126 dst=123.79.190.136 protocol=tcp sport=41952 dport=25 pattern: 1 dst 123.79.190.136 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655117975.732139841 NORDC_MX400_1 flows src=71.210.245.126 dst=123.79.190.136 protocol=tcp sport=41952 dport=25 pattern: 1 dst 123.79.190.136 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 41952
protocol: 6
streamName: meraki
clientIP: 71.210.245.126
serverIP: 123.79.190.136 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655117975.732139841 NORDC_MX400_1 flows src=180.129.39.61 dst=210.25.184.208 protocol=tcp sport=41952 dport=25 pattern: 1 dst 210.25.184.208 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655117975.732139841 NORDC_MX400_1 flows src=180.129.39.61 dst=210.25.184.208 protocol=tcp sport=41952 dport=25 pattern: 1 dst 210.25.184.208",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 41952,
"protocol": 6,
"streamName": "meraki",
"clientIP": "180.129.39.61",
"serverIP": "210.25.184.208"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655117975.732139841 NORDC_MX400_1 flows src=180.129.39.61 dst=210.25.184.208 protocol=tcp sport=41952 dport=25 pattern: 1 dst 210.25.184.208 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655117975.732139841 NORDC_MX400_1 flows src=180.129.39.61 dst=210.25.184.208 protocol=tcp sport=41952 dport=25 pattern: 1 dst 210.25.184.208 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 41952
protocol: 6
streamName: meraki
clientIP: 180.129.39.61
serverIP: 210.25.184.208 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655117976.395368560 NORDC_MX400_1 flows src=177.170.210.114 dst=102.199.76.46 protocol=tcp sport=6055 dport=25 pattern: 1 dst 102.199.76.46 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655117976.395368560 NORDC_MX400_1 flows src=177.170.210.114 dst=102.199.76.46 protocol=tcp sport=6055 dport=25 pattern: 1 dst 102.199.76.46",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6055,
"protocol": 6,
"streamName": "meraki",
"clientIP": "177.170.210.114",
"serverIP": "102.199.76.46"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655117976.395368560 NORDC_MX400_1 flows src=177.170.210.114 dst=102.199.76.46 protocol=tcp sport=6055 dport=25 pattern: 1 dst 102.199.76.46 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655117976.395368560 NORDC_MX400_1 flows src=177.170.210.114 dst=102.199.76.46 protocol=tcp sport=6055 dport=25 pattern: 1 dst 102.199.76.46 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6055
protocol: 6
streamName: meraki
clientIP: 177.170.210.114
serverIP: 102.199.76.46 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655117976.395368560 NORDC_MX400_1 flows src=216.117.209.32 dst=213.216.86.6 protocol=tcp sport=6055 dport=25 pattern: 1 dst 213.216.86.6 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655117976.395368560 NORDC_MX400_1 flows src=216.117.209.32 dst=213.216.86.6 protocol=tcp sport=6055 dport=25 pattern: 1 dst 213.216.86.6",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6055,
"protocol": 6,
"streamName": "meraki",
"clientIP": "216.117.209.32",
"serverIP": "213.216.86.6"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655117976.395368560 NORDC_MX400_1 flows src=216.117.209.32 dst=213.216.86.6 protocol=tcp sport=6055 dport=25 pattern: 1 dst 213.216.86.6 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655117976.395368560 NORDC_MX400_1 flows src=216.117.209.32 dst=213.216.86.6 protocol=tcp sport=6055 dport=25 pattern: 1 dst 213.216.86.6 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6055
protocol: 6
streamName: meraki
clientIP: 216.117.209.32
serverIP: 213.216.86.6 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655123614.654570629 NORDC_MX400_1 flows src=171.32.135.151 dst=65.185.29.228 protocol=tcp sport=26482 dport=25 pattern: 1 dst 65.185.29.228 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655123614.654570629 NORDC_MX400_1 flows src=171.32.135.151 dst=65.185.29.228 protocol=tcp sport=26482 dport=25 pattern: 1 dst 65.185.29.228",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 26482,
"protocol": 6,
"streamName": "meraki",
"clientIP": "171.32.135.151",
"serverIP": "65.185.29.228"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655123614.654570629 NORDC_MX400_1 flows src=171.32.135.151 dst=65.185.29.228 protocol=tcp sport=26482 dport=25 pattern: 1 dst 65.185.29.228 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655123614.654570629 NORDC_MX400_1 flows src=171.32.135.151 dst=65.185.29.228 protocol=tcp sport=26482 dport=25 pattern: 1 dst 65.185.29.228 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 26482
protocol: 6
streamName: meraki
clientIP: 171.32.135.151
serverIP: 65.185.29.228 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655123614.654570629 NORDC_MX400_1 flows src=206.161.99.183 dst=24.12.58.184 protocol=tcp sport=26482 dport=25 pattern: 1 dst 24.12.58.184 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655123614.654570629 NORDC_MX400_1 flows src=206.161.99.183 dst=24.12.58.184 protocol=tcp sport=26482 dport=25 pattern: 1 dst 24.12.58.184",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 26482,
"protocol": 6,
"streamName": "meraki",
"clientIP": "206.161.99.183",
"serverIP": "24.12.58.184"
} | Create a JSON artifact from the message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.