input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<134>Original Address=96.67.227.85 1 1657871098.698041601 M24_MX67C_ForestPark flows src=251.183.140.167 dst=40.157.30.125 protocol=tcp sport=57590 dport=8923 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 8923,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.67.227.85 1 1657871098.698041601 M24_MX67C_ForestPark flows src=251.183.140.167 dst=40.157.30.125 protocol=tcp sport=57590 dport=8923 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 57590,
"protocol": 6,
"streamName": "meraki",
"clientIP": "251.183.140.167",
"serverIP": "40.157.30.125"
} | Create a JSON artifact from the message |
<134>Original Address=96.67.227.85 1 1657871098.698041601 M24_MX67C_ForestPark flows src=251.183.140.167 dst=40.157.30.125 protocol=tcp sport=57590 dport=8923 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.67.227.85 1 1657871098.698041601 M24_MX67C_ForestPark flows src=251.183.140.167 dst=40.157.30.125 protocol=tcp sport=57590 dport=8923 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 8923
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 57590
protocol: 6
streamName: meraki
clientIP: 251.183.140.167
serverIP: 40.157.30.125 | Explain this syslog message |
<134>Original Address=96.67.227.85 1 1657871098.698041601 M24_MX67C_ForestPark flows src=117.199.154.89 dst=4.170.174.11 protocol=tcp sport=57590 dport=8923 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 8923,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.67.227.85 1 1657871098.698041601 M24_MX67C_ForestPark flows src=117.199.154.89 dst=4.170.174.11 protocol=tcp sport=57590 dport=8923 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 57590,
"protocol": 6,
"streamName": "meraki",
"clientIP": "117.199.154.89",
"serverIP": "4.170.174.11"
} | Create a JSON artifact from the message |
<134>Original Address=96.67.227.85 1 1657871098.698041601 M24_MX67C_ForestPark flows src=117.199.154.89 dst=4.170.174.11 protocol=tcp sport=57590 dport=8923 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.67.227.85 1 1657871098.698041601 M24_MX67C_ForestPark flows src=117.199.154.89 dst=4.170.174.11 protocol=tcp sport=57590 dport=8923 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 8923
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 57590
protocol: 6
streamName: meraki
clientIP: 117.199.154.89
serverIP: 4.170.174.11 | Explain this syslog message |
<134>Original Address=96.67.227.85 1 1657871098.698041601 M24_MX67C_ForestPark flows src=123.187.62.247 dst=62.107.161.14 protocol=tcp sport=57590 dport=8923 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 8923,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.67.227.85 1 1657871098.698041601 M24_MX67C_ForestPark flows src=123.187.62.247 dst=62.107.161.14 protocol=tcp sport=57590 dport=8923 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 57590,
"protocol": 6,
"streamName": "meraki",
"clientIP": "123.187.62.247",
"serverIP": "62.107.161.14"
} | Create a JSON artifact from the message |
<134>Original Address=96.67.227.85 1 1657871098.698041601 M24_MX67C_ForestPark flows src=123.187.62.247 dst=62.107.161.14 protocol=tcp sport=57590 dport=8923 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.67.227.85 1 1657871098.698041601 M24_MX67C_ForestPark flows src=123.187.62.247 dst=62.107.161.14 protocol=tcp sport=57590 dport=8923 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 8923
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 57590
protocol: 6
streamName: meraki
clientIP: 123.187.62.247
serverIP: 62.107.161.14 | Explain this syslog message |
<134>Original Address=96.67.227.85 1 1657871098.698041601 M24_MX67C_ForestPark flows src=8.247.124.87 dst=90.239.64.82 protocol=tcp sport=57590 dport=8923 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 8923,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.67.227.85 1 1657871098.698041601 M24_MX67C_ForestPark flows src=8.247.124.87 dst=90.239.64.82 protocol=tcp sport=57590 dport=8923 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 57590,
"protocol": 6,
"streamName": "meraki",
"clientIP": "8.247.124.87",
"serverIP": "90.239.64.82"
} | Create a JSON artifact from the message |
<134>Original Address=96.67.227.85 1 1657871098.698041601 M24_MX67C_ForestPark flows src=8.247.124.87 dst=90.239.64.82 protocol=tcp sport=57590 dport=8923 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.67.227.85 1 1657871098.698041601 M24_MX67C_ForestPark flows src=8.247.124.87 dst=90.239.64.82 protocol=tcp sport=57590 dport=8923 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 8923
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 57590
protocol: 6
streamName: meraki
clientIP: 8.247.124.87
serverIP: 90.239.64.82 | Explain this syslog message |
<134>Original Address=96.67.227.85 1 1657871441.090050392 M24_MX67C_ForestPark flows src=12.67.128.247 dst=154.61.136.3 protocol=tcp sport=53642 dport=81 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 81,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.67.227.85 1 1657871441.090050392 M24_MX67C_ForestPark flows src=12.67.128.247 dst=154.61.136.3 protocol=tcp sport=53642 dport=81 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 53642,
"protocol": 6,
"streamName": "meraki",
"clientIP": "12.67.128.247",
"serverIP": "154.61.136.3"
} | Create a JSON artifact from the message |
<134>Original Address=96.67.227.85 1 1657871441.090050392 M24_MX67C_ForestPark flows src=12.67.128.247 dst=154.61.136.3 protocol=tcp sport=53642 dport=81 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.67.227.85 1 1657871441.090050392 M24_MX67C_ForestPark flows src=12.67.128.247 dst=154.61.136.3 protocol=tcp sport=53642 dport=81 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 81
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 53642
protocol: 6
streamName: meraki
clientIP: 12.67.128.247
serverIP: 154.61.136.3 | Explain this syslog message |
<134>Original Address=96.67.227.85 1 1657871441.090050392 M24_MX67C_ForestPark flows src=73.109.45.221 dst=27.82.199.139 protocol=tcp sport=53642 dport=81 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 81,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.67.227.85 1 1657871441.090050392 M24_MX67C_ForestPark flows src=73.109.45.221 dst=27.82.199.139 protocol=tcp sport=53642 dport=81 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 53642,
"protocol": 6,
"streamName": "meraki",
"clientIP": "73.109.45.221",
"serverIP": "27.82.199.139"
} | Create a JSON artifact from the message |
<134>Original Address=96.67.227.85 1 1657871441.090050392 M24_MX67C_ForestPark flows src=73.109.45.221 dst=27.82.199.139 protocol=tcp sport=53642 dport=81 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.67.227.85 1 1657871441.090050392 M24_MX67C_ForestPark flows src=73.109.45.221 dst=27.82.199.139 protocol=tcp sport=53642 dport=81 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 81
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 53642
protocol: 6
streamName: meraki
clientIP: 73.109.45.221
serverIP: 27.82.199.139 | Explain this syslog message |
<134>Original Address=96.67.227.85 1 1657871441.090050392 M24_MX67C_ForestPark flows src=117.157.19.141 dst=132.84.222.179 protocol=tcp sport=53642 dport=81 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 81,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.67.227.85 1 1657871441.090050392 M24_MX67C_ForestPark flows src=117.157.19.141 dst=132.84.222.179 protocol=tcp sport=53642 dport=81 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 53642,
"protocol": 6,
"streamName": "meraki",
"clientIP": "117.157.19.141",
"serverIP": "132.84.222.179"
} | Create a JSON artifact from the message |
<134>Original Address=96.67.227.85 1 1657871441.090050392 M24_MX67C_ForestPark flows src=117.157.19.141 dst=132.84.222.179 protocol=tcp sport=53642 dport=81 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.67.227.85 1 1657871441.090050392 M24_MX67C_ForestPark flows src=117.157.19.141 dst=132.84.222.179 protocol=tcp sport=53642 dport=81 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 81
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 53642
protocol: 6
streamName: meraki
clientIP: 117.157.19.141
serverIP: 132.84.222.179 | Explain this syslog message |
<134>Original Address=96.67.227.85 1 1657871441.090050392 M24_MX67C_ForestPark flows src=164.197.3.137 dst=6.149.8.88 protocol=tcp sport=53642 dport=81 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 81,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.67.227.85 1 1657871441.090050392 M24_MX67C_ForestPark flows src=164.197.3.137 dst=6.149.8.88 protocol=tcp sport=53642 dport=81 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 53642,
"protocol": 6,
"streamName": "meraki",
"clientIP": "164.197.3.137",
"serverIP": "6.149.8.88"
} | Create a JSON artifact from the message |
<134>Original Address=96.67.227.85 1 1657871441.090050392 M24_MX67C_ForestPark flows src=164.197.3.137 dst=6.149.8.88 protocol=tcp sport=53642 dport=81 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.67.227.85 1 1657871441.090050392 M24_MX67C_ForestPark flows src=164.197.3.137 dst=6.149.8.88 protocol=tcp sport=53642 dport=81 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 81
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 53642
protocol: 6
streamName: meraki
clientIP: 164.197.3.137
serverIP: 6.149.8.88 | Explain this syslog message |
<134>Original Address=193.124.140.151 1 1657869983.001316566 M55_MX67C_Hattiesburg flows src=12.150.100.209 dst=193.124.140.151 protocol=tcp sport=59697 dport=81 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 81,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=193.124.140.151 1 1657869983.001316566 M55_MX67C_Hattiesburg flows src=12.150.100.209 dst=193.124.140.151 protocol=tcp sport=59697 dport=81 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 59697,
"protocol": 6,
"streamName": "meraki",
"clientIP": "12.150.100.209",
"serverIP": "193.124.140.151"
} | Create a JSON artifact from the message |
<134>Original Address=193.124.140.151 1 1657869983.001316566 M55_MX67C_Hattiesburg flows src=12.150.100.209 dst=193.124.140.151 protocol=tcp sport=59697 dport=81 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=193.124.140.151 1 1657869983.001316566 M55_MX67C_Hattiesburg flows src=12.150.100.209 dst=193.124.140.151 protocol=tcp sport=59697 dport=81 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 81
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 59697
protocol: 6
streamName: meraki
clientIP: 12.150.100.209
serverIP: 193.124.140.151 | Explain this syslog message |
<134>Original Address=5.102.181.112 1 1657869983.001316566 M55_MX67C_Hattiesburg flows src=5.158.214.85 dst=5.102.181.112 protocol=tcp sport=59697 dport=81 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 81,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=5.102.181.112 1 1657869983.001316566 M55_MX67C_Hattiesburg flows src=5.158.214.85 dst=5.102.181.112 protocol=tcp sport=59697 dport=81 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 59697,
"protocol": 6,
"streamName": "meraki",
"clientIP": "5.158.214.85",
"serverIP": "5.102.181.112"
} | Create a JSON artifact from the message |
<134>Original Address=5.102.181.112 1 1657869983.001316566 M55_MX67C_Hattiesburg flows src=5.158.214.85 dst=5.102.181.112 protocol=tcp sport=59697 dport=81 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=5.102.181.112 1 1657869983.001316566 M55_MX67C_Hattiesburg flows src=5.158.214.85 dst=5.102.181.112 protocol=tcp sport=59697 dport=81 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 81
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 59697
protocol: 6
streamName: meraki
clientIP: 5.158.214.85
serverIP: 5.102.181.112 | Explain this syslog message |
<134>Original Address=110.127.150.179 1 1657869983.001316566 M55_MX67C_Hattiesburg flows src=81.200.133.252 dst=110.127.150.179 protocol=tcp sport=59697 dport=81 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 81,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=110.127.150.179 1 1657869983.001316566 M55_MX67C_Hattiesburg flows src=81.200.133.252 dst=110.127.150.179 protocol=tcp sport=59697 dport=81 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 59697,
"protocol": 6,
"streamName": "meraki",
"clientIP": "81.200.133.252",
"serverIP": "110.127.150.179"
} | Create a JSON artifact from the message |
<134>Original Address=110.127.150.179 1 1657869983.001316566 M55_MX67C_Hattiesburg flows src=81.200.133.252 dst=110.127.150.179 protocol=tcp sport=59697 dport=81 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=110.127.150.179 1 1657869983.001316566 M55_MX67C_Hattiesburg flows src=81.200.133.252 dst=110.127.150.179 protocol=tcp sport=59697 dport=81 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 81
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 59697
protocol: 6
streamName: meraki
clientIP: 81.200.133.252
serverIP: 110.127.150.179 | Explain this syslog message |
<134>Original Address=26.207.11.86 1 1657869983.001316566 M55_MX67C_Hattiesburg flows src=74.176.10.234 dst=26.207.11.86 protocol=tcp sport=59697 dport=81 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 81,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=26.207.11.86 1 1657869983.001316566 M55_MX67C_Hattiesburg flows src=74.176.10.234 dst=26.207.11.86 protocol=tcp sport=59697 dport=81 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 59697,
"protocol": 6,
"streamName": "meraki",
"clientIP": "74.176.10.234",
"serverIP": "26.207.11.86"
} | Create a JSON artifact from the message |
<134>Original Address=26.207.11.86 1 1657869983.001316566 M55_MX67C_Hattiesburg flows src=74.176.10.234 dst=26.207.11.86 protocol=tcp sport=59697 dport=81 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=26.207.11.86 1 1657869983.001316566 M55_MX67C_Hattiesburg flows src=74.176.10.234 dst=26.207.11.86 protocol=tcp sport=59697 dport=81 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 81
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 59697
protocol: 6
streamName: meraki
clientIP: 74.176.10.234
serverIP: 26.207.11.86 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1657869766.069014701 M61_MX67C_Savannah flows src=197.116.162.112 dst=252.113.101.17 protocol=tcp sport=57590 dport=33383 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 33383,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1657869766.069014701 M61_MX67C_Savannah flows src=197.116.162.112 dst=252.113.101.17 protocol=tcp sport=57590 dport=33383 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 57590,
"protocol": 6,
"streamName": "meraki",
"clientIP": "197.116.162.112",
"serverIP": "252.113.101.17"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1657869766.069014701 M61_MX67C_Savannah flows src=197.116.162.112 dst=252.113.101.17 protocol=tcp sport=57590 dport=33383 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1657869766.069014701 M61_MX67C_Savannah flows src=197.116.162.112 dst=252.113.101.17 protocol=tcp sport=57590 dport=33383 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 33383
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 57590
protocol: 6
streamName: meraki
clientIP: 197.116.162.112
serverIP: 252.113.101.17 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1657869766.069014701 M61_MX67C_Savannah flows src=100.204.154.247 dst=10.122.40.181 protocol=tcp sport=57590 dport=33383 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 33383,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1657869766.069014701 M61_MX67C_Savannah flows src=100.204.154.247 dst=10.122.40.181 protocol=tcp sport=57590 dport=33383 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 57590,
"protocol": 6,
"streamName": "meraki",
"clientIP": "100.204.154.247",
"serverIP": "10.122.40.181"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1657869766.069014701 M61_MX67C_Savannah flows src=100.204.154.247 dst=10.122.40.181 protocol=tcp sport=57590 dport=33383 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1657869766.069014701 M61_MX67C_Savannah flows src=100.204.154.247 dst=10.122.40.181 protocol=tcp sport=57590 dport=33383 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 33383
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 57590
protocol: 6
streamName: meraki
clientIP: 100.204.154.247
serverIP: 10.122.40.181 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1657869766.069014701 M61_MX67C_Savannah flows src=16.225.124.198 dst=248.76.111.166 protocol=tcp sport=57590 dport=33383 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 33383,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1657869766.069014701 M61_MX67C_Savannah flows src=16.225.124.198 dst=248.76.111.166 protocol=tcp sport=57590 dport=33383 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 57590,
"protocol": 6,
"streamName": "meraki",
"clientIP": "16.225.124.198",
"serverIP": "248.76.111.166"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1657869766.069014701 M61_MX67C_Savannah flows src=16.225.124.198 dst=248.76.111.166 protocol=tcp sport=57590 dport=33383 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1657869766.069014701 M61_MX67C_Savannah flows src=16.225.124.198 dst=248.76.111.166 protocol=tcp sport=57590 dport=33383 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 33383
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 57590
protocol: 6
streamName: meraki
clientIP: 16.225.124.198
serverIP: 248.76.111.166 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1657869766.069014701 M61_MX67C_Savannah flows src=175.174.52.50 dst=220.194.36.44 protocol=tcp sport=57590 dport=33383 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 33383,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1657869766.069014701 M61_MX67C_Savannah flows src=175.174.52.50 dst=220.194.36.44 protocol=tcp sport=57590 dport=33383 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 57590,
"protocol": 6,
"streamName": "meraki",
"clientIP": "175.174.52.50",
"serverIP": "220.194.36.44"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1657869766.069014701 M61_MX67C_Savannah flows src=175.174.52.50 dst=220.194.36.44 protocol=tcp sport=57590 dport=33383 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1657869766.069014701 M61_MX67C_Savannah flows src=175.174.52.50 dst=220.194.36.44 protocol=tcp sport=57590 dport=33383 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 33383
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 57590
protocol: 6
streamName: meraki
clientIP: 175.174.52.50
serverIP: 220.194.36.44 | Explain this syslog message |
<134>Original Address=80.105.65.218 1 1657869621.799594323 M66_MX67C_HiltonHead flows src=31.211.247.64 dst=80.105.65.218 protocol=tcp sport=35610 dport=23 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 23,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=80.105.65.218 1 1657869621.799594323 M66_MX67C_HiltonHead flows src=31.211.247.64 dst=80.105.65.218 protocol=tcp sport=35610 dport=23 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 35610,
"protocol": 6,
"streamName": "meraki",
"clientIP": "31.211.247.64",
"serverIP": "80.105.65.218"
} | Create a JSON artifact from the message |
<134>Original Address=80.105.65.218 1 1657869621.799594323 M66_MX67C_HiltonHead flows src=31.211.247.64 dst=80.105.65.218 protocol=tcp sport=35610 dport=23 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=80.105.65.218 1 1657869621.799594323 M66_MX67C_HiltonHead flows src=31.211.247.64 dst=80.105.65.218 protocol=tcp sport=35610 dport=23 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 23
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 35610
protocol: 6
streamName: meraki
clientIP: 31.211.247.64
serverIP: 80.105.65.218 | Explain this syslog message |
<134>Original Address=50.81.152.131 1 1657869621.799594323 M66_MX67C_HiltonHead flows src=57.79.176.214 dst=50.81.152.131 protocol=tcp sport=35610 dport=23 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 23,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=50.81.152.131 1 1657869621.799594323 M66_MX67C_HiltonHead flows src=57.79.176.214 dst=50.81.152.131 protocol=tcp sport=35610 dport=23 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 35610,
"protocol": 6,
"streamName": "meraki",
"clientIP": "57.79.176.214",
"serverIP": "50.81.152.131"
} | Create a JSON artifact from the message |
<134>Original Address=50.81.152.131 1 1657869621.799594323 M66_MX67C_HiltonHead flows src=57.79.176.214 dst=50.81.152.131 protocol=tcp sport=35610 dport=23 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=50.81.152.131 1 1657869621.799594323 M66_MX67C_HiltonHead flows src=57.79.176.214 dst=50.81.152.131 protocol=tcp sport=35610 dport=23 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 23
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 35610
protocol: 6
streamName: meraki
clientIP: 57.79.176.214
serverIP: 50.81.152.131 | Explain this syslog message |
<134>Original Address=86.179.178.185 1 1657869621.799594323 M66_MX67C_HiltonHead flows src=132.144.242.109 dst=86.179.178.185 protocol=tcp sport=35610 dport=23 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 23,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=86.179.178.185 1 1657869621.799594323 M66_MX67C_HiltonHead flows src=132.144.242.109 dst=86.179.178.185 protocol=tcp sport=35610 dport=23 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 35610,
"protocol": 6,
"streamName": "meraki",
"clientIP": "132.144.242.109",
"serverIP": "86.179.178.185"
} | Create a JSON artifact from the message |
<134>Original Address=86.179.178.185 1 1657869621.799594323 M66_MX67C_HiltonHead flows src=132.144.242.109 dst=86.179.178.185 protocol=tcp sport=35610 dport=23 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=86.179.178.185 1 1657869621.799594323 M66_MX67C_HiltonHead flows src=132.144.242.109 dst=86.179.178.185 protocol=tcp sport=35610 dport=23 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 23
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 35610
protocol: 6
streamName: meraki
clientIP: 132.144.242.109
serverIP: 86.179.178.185 | Explain this syslog message |
<134>Original Address=225.49.117.230 1 1657869621.799594323 M66_MX67C_HiltonHead flows src=66.195.210.113 dst=225.49.117.230 protocol=tcp sport=35610 dport=23 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 23,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=225.49.117.230 1 1657869621.799594323 M66_MX67C_HiltonHead flows src=66.195.210.113 dst=225.49.117.230 protocol=tcp sport=35610 dport=23 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 35610,
"protocol": 6,
"streamName": "meraki",
"clientIP": "66.195.210.113",
"serverIP": "225.49.117.230"
} | Create a JSON artifact from the message |
<134>Original Address=225.49.117.230 1 1657869621.799594323 M66_MX67C_HiltonHead flows src=66.195.210.113 dst=225.49.117.230 protocol=tcp sport=35610 dport=23 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=225.49.117.230 1 1657869621.799594323 M66_MX67C_HiltonHead flows src=66.195.210.113 dst=225.49.117.230 protocol=tcp sport=35610 dport=23 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 23
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 35610
protocol: 6
streamName: meraki
clientIP: 66.195.210.113
serverIP: 225.49.117.230 | Explain this syslog message |
<134>Original Address=159.112.26.120 1 1657870817.623339754 M66_MX67C_HiltonHead flows src=240.196.9.146 dst=159.112.26.120 protocol=tcp sport=38835 dport=8081 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 8081,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=159.112.26.120 1 1657870817.623339754 M66_MX67C_HiltonHead flows src=240.196.9.146 dst=159.112.26.120 protocol=tcp sport=38835 dport=8081 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 38835,
"protocol": 6,
"streamName": "meraki",
"clientIP": "240.196.9.146",
"serverIP": "159.112.26.120"
} | Create a JSON artifact from the message |
<134>Original Address=159.112.26.120 1 1657870817.623339754 M66_MX67C_HiltonHead flows src=240.196.9.146 dst=159.112.26.120 protocol=tcp sport=38835 dport=8081 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=159.112.26.120 1 1657870817.623339754 M66_MX67C_HiltonHead flows src=240.196.9.146 dst=159.112.26.120 protocol=tcp sport=38835 dport=8081 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 8081
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 38835
protocol: 6
streamName: meraki
clientIP: 240.196.9.146
serverIP: 159.112.26.120 | Explain this syslog message |
<134>Original Address=131.90.220.148 1 1657870817.623339754 M66_MX67C_HiltonHead flows src=189.150.222.18 dst=131.90.220.148 protocol=tcp sport=38835 dport=8081 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 8081,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=131.90.220.148 1 1657870817.623339754 M66_MX67C_HiltonHead flows src=189.150.222.18 dst=131.90.220.148 protocol=tcp sport=38835 dport=8081 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 38835,
"protocol": 6,
"streamName": "meraki",
"clientIP": "189.150.222.18",
"serverIP": "131.90.220.148"
} | Create a JSON artifact from the message |
<134>Original Address=131.90.220.148 1 1657870817.623339754 M66_MX67C_HiltonHead flows src=189.150.222.18 dst=131.90.220.148 protocol=tcp sport=38835 dport=8081 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=131.90.220.148 1 1657870817.623339754 M66_MX67C_HiltonHead flows src=189.150.222.18 dst=131.90.220.148 protocol=tcp sport=38835 dport=8081 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 8081
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 38835
protocol: 6
streamName: meraki
clientIP: 189.150.222.18
serverIP: 131.90.220.148 | Explain this syslog message |
<134>Original Address=248.176.252.179 1 1657870817.623339754 M66_MX67C_HiltonHead flows src=69.124.16.61 dst=248.176.252.179 protocol=tcp sport=38835 dport=8081 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 8081,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=248.176.252.179 1 1657870817.623339754 M66_MX67C_HiltonHead flows src=69.124.16.61 dst=248.176.252.179 protocol=tcp sport=38835 dport=8081 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 38835,
"protocol": 6,
"streamName": "meraki",
"clientIP": "69.124.16.61",
"serverIP": "248.176.252.179"
} | Create a JSON artifact from the message |
<134>Original Address=248.176.252.179 1 1657870817.623339754 M66_MX67C_HiltonHead flows src=69.124.16.61 dst=248.176.252.179 protocol=tcp sport=38835 dport=8081 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=248.176.252.179 1 1657870817.623339754 M66_MX67C_HiltonHead flows src=69.124.16.61 dst=248.176.252.179 protocol=tcp sport=38835 dport=8081 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 8081
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 38835
protocol: 6
streamName: meraki
clientIP: 69.124.16.61
serverIP: 248.176.252.179 | Explain this syslog message |
<134>Original Address=10.71.148.197 1 1657870817.623339754 M66_MX67C_HiltonHead flows src=164.150.106.149 dst=10.71.148.197 protocol=tcp sport=38835 dport=8081 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 8081,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=10.71.148.197 1 1657870817.623339754 M66_MX67C_HiltonHead flows src=164.150.106.149 dst=10.71.148.197 protocol=tcp sport=38835 dport=8081 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 38835,
"protocol": 6,
"streamName": "meraki",
"clientIP": "164.150.106.149",
"serverIP": "10.71.148.197"
} | Create a JSON artifact from the message |
<134>Original Address=10.71.148.197 1 1657870817.623339754 M66_MX67C_HiltonHead flows src=164.150.106.149 dst=10.71.148.197 protocol=tcp sport=38835 dport=8081 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=10.71.148.197 1 1657870817.623339754 M66_MX67C_HiltonHead flows src=164.150.106.149 dst=10.71.148.197 protocol=tcp sport=38835 dport=8081 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 8081
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 38835
protocol: 6
streamName: meraki
clientIP: 164.150.106.149
serverIP: 10.71.148.197 | Explain this syslog message |
<134>Original Address=115.118.114.198 1 1657869998.110538674 M66_MX67C_HiltonHead flows src=228.99.57.65 dst=115.118.114.198 protocol=tcp sport=49869 dport=4200 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 4200,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=115.118.114.198 1 1657869998.110538674 M66_MX67C_HiltonHead flows src=228.99.57.65 dst=115.118.114.198 protocol=tcp sport=49869 dport=4200 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 49869,
"protocol": 6,
"streamName": "meraki",
"clientIP": "228.99.57.65",
"serverIP": "115.118.114.198"
} | Create a JSON artifact from the message |
<134>Original Address=115.118.114.198 1 1657869998.110538674 M66_MX67C_HiltonHead flows src=228.99.57.65 dst=115.118.114.198 protocol=tcp sport=49869 dport=4200 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=115.118.114.198 1 1657869998.110538674 M66_MX67C_HiltonHead flows src=228.99.57.65 dst=115.118.114.198 protocol=tcp sport=49869 dport=4200 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 4200
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 49869
protocol: 6
streamName: meraki
clientIP: 228.99.57.65
serverIP: 115.118.114.198 | Explain this syslog message |
<134>Original Address=178.233.30.27 1 1657869998.110538674 M66_MX67C_HiltonHead flows src=27.4.133.88 dst=178.233.30.27 protocol=tcp sport=49869 dport=4200 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 4200,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=178.233.30.27 1 1657869998.110538674 M66_MX67C_HiltonHead flows src=27.4.133.88 dst=178.233.30.27 protocol=tcp sport=49869 dport=4200 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 49869,
"protocol": 6,
"streamName": "meraki",
"clientIP": "27.4.133.88",
"serverIP": "178.233.30.27"
} | Create a JSON artifact from the message |
<134>Original Address=178.233.30.27 1 1657869998.110538674 M66_MX67C_HiltonHead flows src=27.4.133.88 dst=178.233.30.27 protocol=tcp sport=49869 dport=4200 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=178.233.30.27 1 1657869998.110538674 M66_MX67C_HiltonHead flows src=27.4.133.88 dst=178.233.30.27 protocol=tcp sport=49869 dport=4200 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 4200
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 49869
protocol: 6
streamName: meraki
clientIP: 27.4.133.88
serverIP: 178.233.30.27 | Explain this syslog message |
<134>Original Address=197.180.125.80 1 1657869998.110538674 M66_MX67C_HiltonHead flows src=30.56.140.12 dst=197.180.125.80 protocol=tcp sport=49869 dport=4200 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 4200,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=197.180.125.80 1 1657869998.110538674 M66_MX67C_HiltonHead flows src=30.56.140.12 dst=197.180.125.80 protocol=tcp sport=49869 dport=4200 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 49869,
"protocol": 6,
"streamName": "meraki",
"clientIP": "30.56.140.12",
"serverIP": "197.180.125.80"
} | Create a JSON artifact from the message |
<134>Original Address=197.180.125.80 1 1657869998.110538674 M66_MX67C_HiltonHead flows src=30.56.140.12 dst=197.180.125.80 protocol=tcp sport=49869 dport=4200 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=197.180.125.80 1 1657869998.110538674 M66_MX67C_HiltonHead flows src=30.56.140.12 dst=197.180.125.80 protocol=tcp sport=49869 dport=4200 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 4200
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 49869
protocol: 6
streamName: meraki
clientIP: 30.56.140.12
serverIP: 197.180.125.80 | Explain this syslog message |
<134>Original Address=68.71.210.251 1 1657869998.110538674 M66_MX67C_HiltonHead flows src=117.72.116.255 dst=68.71.210.251 protocol=tcp sport=49869 dport=4200 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 4200,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=68.71.210.251 1 1657869998.110538674 M66_MX67C_HiltonHead flows src=117.72.116.255 dst=68.71.210.251 protocol=tcp sport=49869 dport=4200 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 49869,
"protocol": 6,
"streamName": "meraki",
"clientIP": "117.72.116.255",
"serverIP": "68.71.210.251"
} | Create a JSON artifact from the message |
<134>Original Address=68.71.210.251 1 1657869998.110538674 M66_MX67C_HiltonHead flows src=117.72.116.255 dst=68.71.210.251 protocol=tcp sport=49869 dport=4200 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=68.71.210.251 1 1657869998.110538674 M66_MX67C_HiltonHead flows src=117.72.116.255 dst=68.71.210.251 protocol=tcp sport=49869 dport=4200 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 4200
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 49869
protocol: 6
streamName: meraki
clientIP: 117.72.116.255
serverIP: 68.71.210.251 | Explain this syslog message |
<134>Original Address=219.191.92.81 1 1657869998.469943138 M73_MX67C_Brunswick flows src=174.113.207.1 dst=219.191.92.81 protocol=tcp sport=49592 dport=30083 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 30083,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=219.191.92.81 1 1657869998.469943138 M73_MX67C_Brunswick flows src=174.113.207.1 dst=219.191.92.81 protocol=tcp sport=49592 dport=30083 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 49592,
"protocol": 6,
"streamName": "meraki",
"clientIP": "174.113.207.1",
"serverIP": "219.191.92.81"
} | Create a JSON artifact from the message |
<134>Original Address=219.191.92.81 1 1657869998.469943138 M73_MX67C_Brunswick flows src=174.113.207.1 dst=219.191.92.81 protocol=tcp sport=49592 dport=30083 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=219.191.92.81 1 1657869998.469943138 M73_MX67C_Brunswick flows src=174.113.207.1 dst=219.191.92.81 protocol=tcp sport=49592 dport=30083 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 30083
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 49592
protocol: 6
streamName: meraki
clientIP: 174.113.207.1
serverIP: 219.191.92.81 | Explain this syslog message |
<134>Original Address=232.236.113.109 1 1657869998.469943138 M73_MX67C_Brunswick flows src=19.252.158.87 dst=232.236.113.109 protocol=tcp sport=49592 dport=30083 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 30083,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=232.236.113.109 1 1657869998.469943138 M73_MX67C_Brunswick flows src=19.252.158.87 dst=232.236.113.109 protocol=tcp sport=49592 dport=30083 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 49592,
"protocol": 6,
"streamName": "meraki",
"clientIP": "19.252.158.87",
"serverIP": "232.236.113.109"
} | Create a JSON artifact from the message |
<134>Original Address=232.236.113.109 1 1657869998.469943138 M73_MX67C_Brunswick flows src=19.252.158.87 dst=232.236.113.109 protocol=tcp sport=49592 dport=30083 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=232.236.113.109 1 1657869998.469943138 M73_MX67C_Brunswick flows src=19.252.158.87 dst=232.236.113.109 protocol=tcp sport=49592 dport=30083 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 30083
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 49592
protocol: 6
streamName: meraki
clientIP: 19.252.158.87
serverIP: 232.236.113.109 | Explain this syslog message |
<134>Original Address=203.185.204.124 1 1657869998.469943138 M73_MX67C_Brunswick flows src=225.57.16.207 dst=203.185.204.124 protocol=tcp sport=49592 dport=30083 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 30083,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=203.185.204.124 1 1657869998.469943138 M73_MX67C_Brunswick flows src=225.57.16.207 dst=203.185.204.124 protocol=tcp sport=49592 dport=30083 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 49592,
"protocol": 6,
"streamName": "meraki",
"clientIP": "225.57.16.207",
"serverIP": "203.185.204.124"
} | Create a JSON artifact from the message |
<134>Original Address=203.185.204.124 1 1657869998.469943138 M73_MX67C_Brunswick flows src=225.57.16.207 dst=203.185.204.124 protocol=tcp sport=49592 dport=30083 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=203.185.204.124 1 1657869998.469943138 M73_MX67C_Brunswick flows src=225.57.16.207 dst=203.185.204.124 protocol=tcp sport=49592 dport=30083 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 30083
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 49592
protocol: 6
streamName: meraki
clientIP: 225.57.16.207
serverIP: 203.185.204.124 | Explain this syslog message |
<134>Original Address=240.106.139.180 1 1657869998.469943138 M73_MX67C_Brunswick flows src=56.87.34.176 dst=240.106.139.180 protocol=tcp sport=49592 dport=30083 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 30083,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=240.106.139.180 1 1657869998.469943138 M73_MX67C_Brunswick flows src=56.87.34.176 dst=240.106.139.180 protocol=tcp sport=49592 dport=30083 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 49592,
"protocol": 6,
"streamName": "meraki",
"clientIP": "56.87.34.176",
"serverIP": "240.106.139.180"
} | Create a JSON artifact from the message |
<134>Original Address=240.106.139.180 1 1657869998.469943138 M73_MX67C_Brunswick flows src=56.87.34.176 dst=240.106.139.180 protocol=tcp sport=49592 dport=30083 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=240.106.139.180 1 1657869998.469943138 M73_MX67C_Brunswick flows src=56.87.34.176 dst=240.106.139.180 protocol=tcp sport=49592 dport=30083 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 30083
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 49592
protocol: 6
streamName: meraki
clientIP: 56.87.34.176
serverIP: 240.106.139.180 | Explain this syslog message |
<134>Original Address=37.218.155.90 1 1657869767.590998258 M73_MX67C_Brunswick flows src=104.58.15.21 dst=37.218.155.90 protocol=tcp sport=29442 dport=6379 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 6379,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=37.218.155.90 1 1657869767.590998258 M73_MX67C_Brunswick flows src=104.58.15.21 dst=37.218.155.90 protocol=tcp sport=29442 dport=6379 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 29442,
"protocol": 6,
"streamName": "meraki",
"clientIP": "104.58.15.21",
"serverIP": "37.218.155.90"
} | Create a JSON artifact from the message |
<134>Original Address=37.218.155.90 1 1657869767.590998258 M73_MX67C_Brunswick flows src=104.58.15.21 dst=37.218.155.90 protocol=tcp sport=29442 dport=6379 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=37.218.155.90 1 1657869767.590998258 M73_MX67C_Brunswick flows src=104.58.15.21 dst=37.218.155.90 protocol=tcp sport=29442 dport=6379 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 6379
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 29442
protocol: 6
streamName: meraki
clientIP: 104.58.15.21
serverIP: 37.218.155.90 | Explain this syslog message |
<134>Original Address=8.116.178.23 1 1657869767.590998258 M73_MX67C_Brunswick flows src=32.174.105.50 dst=8.116.178.23 protocol=tcp sport=29442 dport=6379 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 6379,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=8.116.178.23 1 1657869767.590998258 M73_MX67C_Brunswick flows src=32.174.105.50 dst=8.116.178.23 protocol=tcp sport=29442 dport=6379 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 29442,
"protocol": 6,
"streamName": "meraki",
"clientIP": "32.174.105.50",
"serverIP": "8.116.178.23"
} | Create a JSON artifact from the message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.