input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<134>Original Address=8.116.178.23 1 1657869767.590998258 M73_MX67C_Brunswick flows src=32.174.105.50 dst=8.116.178.23 protocol=tcp sport=29442 dport=6379 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=8.116.178.23 1 1657869767.590998258 M73_MX67C_Brunswick flows src=32.174.105.50 dst=8.116.178.23 protocol=tcp sport=29442 dport=6379 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 6379
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 29442
protocol: 6
streamName: meraki
clientIP: 32.174.105.50
serverIP: 8.116.178.23 | Explain this syslog message |
<134>Original Address=219.119.171.44 1 1657869767.590998258 M73_MX67C_Brunswick flows src=252.88.231.199 dst=219.119.171.44 protocol=tcp sport=29442 dport=6379 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 6379,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=219.119.171.44 1 1657869767.590998258 M73_MX67C_Brunswick flows src=252.88.231.199 dst=219.119.171.44 protocol=tcp sport=29442 dport=6379 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 29442,
"protocol": 6,
"streamName": "meraki",
"clientIP": "252.88.231.199",
"serverIP": "219.119.171.44"
} | Create a JSON artifact from the message |
<134>Original Address=219.119.171.44 1 1657869767.590998258 M73_MX67C_Brunswick flows src=252.88.231.199 dst=219.119.171.44 protocol=tcp sport=29442 dport=6379 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=219.119.171.44 1 1657869767.590998258 M73_MX67C_Brunswick flows src=252.88.231.199 dst=219.119.171.44 protocol=tcp sport=29442 dport=6379 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 6379
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 29442
protocol: 6
streamName: meraki
clientIP: 252.88.231.199
serverIP: 219.119.171.44 | Explain this syslog message |
<134>Original Address=77.17.162.6 1 1657869767.590998258 M73_MX67C_Brunswick flows src=199.118.132.42 dst=77.17.162.6 protocol=tcp sport=29442 dport=6379 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 6379,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=77.17.162.6 1 1657869767.590998258 M73_MX67C_Brunswick flows src=199.118.132.42 dst=77.17.162.6 protocol=tcp sport=29442 dport=6379 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 29442,
"protocol": 6,
"streamName": "meraki",
"clientIP": "199.118.132.42",
"serverIP": "77.17.162.6"
} | Create a JSON artifact from the message |
<134>Original Address=77.17.162.6 1 1657869767.590998258 M73_MX67C_Brunswick flows src=199.118.132.42 dst=77.17.162.6 protocol=tcp sport=29442 dport=6379 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=77.17.162.6 1 1657869767.590998258 M73_MX67C_Brunswick flows src=199.118.132.42 dst=77.17.162.6 protocol=tcp sport=29442 dport=6379 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 6379
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 29442
protocol: 6
streamName: meraki
clientIP: 199.118.132.42
serverIP: 77.17.162.6 | Explain this syslog message |
<134>Original Address=112.63.97.200 1 1657871133.990060260 M73_MX67C_Brunswick flows src=66.219.11.74 dst=112.63.97.200 protocol=tcp sport=46322 dport=8081 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 8081,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=112.63.97.200 1 1657871133.990060260 M73_MX67C_Brunswick flows src=66.219.11.74 dst=112.63.97.200 protocol=tcp sport=46322 dport=8081 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 46322,
"protocol": 6,
"streamName": "meraki",
"clientIP": "66.219.11.74",
"serverIP": "112.63.97.200"
} | Create a JSON artifact from the message |
<134>Original Address=112.63.97.200 1 1657871133.990060260 M73_MX67C_Brunswick flows src=66.219.11.74 dst=112.63.97.200 protocol=tcp sport=46322 dport=8081 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=112.63.97.200 1 1657871133.990060260 M73_MX67C_Brunswick flows src=66.219.11.74 dst=112.63.97.200 protocol=tcp sport=46322 dport=8081 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 8081
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 46322
protocol: 6
streamName: meraki
clientIP: 66.219.11.74
serverIP: 112.63.97.200 | Explain this syslog message |
<134>Original Address=223.231.214.57 1 1657871133.990060260 M73_MX67C_Brunswick flows src=100.109.6.201 dst=223.231.214.57 protocol=tcp sport=46322 dport=8081 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 8081,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=223.231.214.57 1 1657871133.990060260 M73_MX67C_Brunswick flows src=100.109.6.201 dst=223.231.214.57 protocol=tcp sport=46322 dport=8081 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 46322,
"protocol": 6,
"streamName": "meraki",
"clientIP": "100.109.6.201",
"serverIP": "223.231.214.57"
} | Create a JSON artifact from the message |
<134>Original Address=223.231.214.57 1 1657871133.990060260 M73_MX67C_Brunswick flows src=100.109.6.201 dst=223.231.214.57 protocol=tcp sport=46322 dport=8081 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=223.231.214.57 1 1657871133.990060260 M73_MX67C_Brunswick flows src=100.109.6.201 dst=223.231.214.57 protocol=tcp sport=46322 dport=8081 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 8081
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 46322
protocol: 6
streamName: meraki
clientIP: 100.109.6.201
serverIP: 223.231.214.57 | Explain this syslog message |
<134>Original Address=184.51.67.130 1 1657871133.990060260 M73_MX67C_Brunswick flows src=191.69.155.87 dst=184.51.67.130 protocol=tcp sport=46322 dport=8081 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 8081,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=184.51.67.130 1 1657871133.990060260 M73_MX67C_Brunswick flows src=191.69.155.87 dst=184.51.67.130 protocol=tcp sport=46322 dport=8081 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 46322,
"protocol": 6,
"streamName": "meraki",
"clientIP": "191.69.155.87",
"serverIP": "184.51.67.130"
} | Create a JSON artifact from the message |
<134>Original Address=184.51.67.130 1 1657871133.990060260 M73_MX67C_Brunswick flows src=191.69.155.87 dst=184.51.67.130 protocol=tcp sport=46322 dport=8081 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=184.51.67.130 1 1657871133.990060260 M73_MX67C_Brunswick flows src=191.69.155.87 dst=184.51.67.130 protocol=tcp sport=46322 dport=8081 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 8081
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 46322
protocol: 6
streamName: meraki
clientIP: 191.69.155.87
serverIP: 184.51.67.130 | Explain this syslog message |
<134>Original Address=251.63.175.184 1 1657871133.990060260 M73_MX67C_Brunswick flows src=77.168.191.94 dst=251.63.175.184 protocol=tcp sport=46322 dport=8081 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 8081,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=251.63.175.184 1 1657871133.990060260 M73_MX67C_Brunswick flows src=77.168.191.94 dst=251.63.175.184 protocol=tcp sport=46322 dport=8081 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 46322,
"protocol": 6,
"streamName": "meraki",
"clientIP": "77.168.191.94",
"serverIP": "251.63.175.184"
} | Create a JSON artifact from the message |
<134>Original Address=251.63.175.184 1 1657871133.990060260 M73_MX67C_Brunswick flows src=77.168.191.94 dst=251.63.175.184 protocol=tcp sport=46322 dport=8081 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=251.63.175.184 1 1657871133.990060260 M73_MX67C_Brunswick flows src=77.168.191.94 dst=251.63.175.184 protocol=tcp sport=46322 dport=8081 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 8081
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 46322
protocol: 6
streamName: meraki
clientIP: 77.168.191.94
serverIP: 251.63.175.184 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.524190679 NORDC_MX400_1 flows src=111.144.159.190 dst=183.212.11.87 protocol=tcp sport=42666 dport=25 pattern: 1 dst 183.212.11.87 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659654758.524190679 NORDC_MX400_1 flows src=111.144.159.190 dst=183.212.11.87 protocol=tcp sport=42666 dport=25 pattern: 1 dst 183.212.11.87",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 42666,
"protocol": 6,
"streamName": "meraki",
"clientIP": "111.144.159.190",
"serverIP": "183.212.11.87"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659654758.524190679 NORDC_MX400_1 flows src=111.144.159.190 dst=183.212.11.87 protocol=tcp sport=42666 dport=25 pattern: 1 dst 183.212.11.87 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.524190679 NORDC_MX400_1 flows src=111.144.159.190 dst=183.212.11.87 protocol=tcp sport=42666 dport=25 pattern: 1 dst 183.212.11.87 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 42666
protocol: 6
streamName: meraki
clientIP: 111.144.159.190
serverIP: 183.212.11.87 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.524190679 NORDC_MX400_1 flows src=252.118.28.44 dst=190.21.55.224 protocol=tcp sport=42666 dport=25 pattern: 1 dst 190.21.55.224 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659654758.524190679 NORDC_MX400_1 flows src=252.118.28.44 dst=190.21.55.224 protocol=tcp sport=42666 dport=25 pattern: 1 dst 190.21.55.224",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 42666,
"protocol": 6,
"streamName": "meraki",
"clientIP": "252.118.28.44",
"serverIP": "190.21.55.224"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659654758.524190679 NORDC_MX400_1 flows src=252.118.28.44 dst=190.21.55.224 protocol=tcp sport=42666 dport=25 pattern: 1 dst 190.21.55.224 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.524190679 NORDC_MX400_1 flows src=252.118.28.44 dst=190.21.55.224 protocol=tcp sport=42666 dport=25 pattern: 1 dst 190.21.55.224 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 42666
protocol: 6
streamName: meraki
clientIP: 252.118.28.44
serverIP: 190.21.55.224 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.306288736 NORDC_MX400_1 flows src=248.13.246.201 dst=221.101.244.34 protocol=tcp sport=6288 dport=25 pattern: 1 dst 221.101.244.34 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659654758.306288736 NORDC_MX400_1 flows src=248.13.246.201 dst=221.101.244.34 protocol=tcp sport=6288 dport=25 pattern: 1 dst 221.101.244.34",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6288,
"protocol": 6,
"streamName": "meraki",
"clientIP": "248.13.246.201",
"serverIP": "221.101.244.34"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659654758.306288736 NORDC_MX400_1 flows src=248.13.246.201 dst=221.101.244.34 protocol=tcp sport=6288 dport=25 pattern: 1 dst 221.101.244.34 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.306288736 NORDC_MX400_1 flows src=248.13.246.201 dst=221.101.244.34 protocol=tcp sport=6288 dport=25 pattern: 1 dst 221.101.244.34 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6288
protocol: 6
streamName: meraki
clientIP: 248.13.246.201
serverIP: 221.101.244.34 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.306288736 NORDC_MX400_1 flows src=49.63.35.193 dst=8.45.215.6 protocol=tcp sport=6288 dport=25 pattern: 1 dst 8.45.215.6 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659654758.306288736 NORDC_MX400_1 flows src=49.63.35.193 dst=8.45.215.6 protocol=tcp sport=6288 dport=25 pattern: 1 dst 8.45.215.6",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6288,
"protocol": 6,
"streamName": "meraki",
"clientIP": "49.63.35.193",
"serverIP": "8.45.215.6"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659654758.306288736 NORDC_MX400_1 flows src=49.63.35.193 dst=8.45.215.6 protocol=tcp sport=6288 dport=25 pattern: 1 dst 8.45.215.6 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.306288736 NORDC_MX400_1 flows src=49.63.35.193 dst=8.45.215.6 protocol=tcp sport=6288 dport=25 pattern: 1 dst 8.45.215.6 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6288
protocol: 6
streamName: meraki
clientIP: 49.63.35.193
serverIP: 8.45.215.6 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.325734473 NORDC_MX400_1 flows src=117.252.169.176 dst=129.187.209.222 protocol=tcp sport=6147 dport=25 pattern: 1 dst 129.187.209.222 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659654758.325734473 NORDC_MX400_1 flows src=117.252.169.176 dst=129.187.209.222 protocol=tcp sport=6147 dport=25 pattern: 1 dst 129.187.209.222",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6147,
"protocol": 6,
"streamName": "meraki",
"clientIP": "117.252.169.176",
"serverIP": "129.187.209.222"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659654758.325734473 NORDC_MX400_1 flows src=117.252.169.176 dst=129.187.209.222 protocol=tcp sport=6147 dport=25 pattern: 1 dst 129.187.209.222 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.325734473 NORDC_MX400_1 flows src=117.252.169.176 dst=129.187.209.222 protocol=tcp sport=6147 dport=25 pattern: 1 dst 129.187.209.222 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6147
protocol: 6
streamName: meraki
clientIP: 117.252.169.176
serverIP: 129.187.209.222 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.325734473 NORDC_MX400_1 flows src=195.211.173.209 dst=15.200.225.32 protocol=tcp sport=6147 dport=25 pattern: 1 dst 15.200.225.32 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659654758.325734473 NORDC_MX400_1 flows src=195.211.173.209 dst=15.200.225.32 protocol=tcp sport=6147 dport=25 pattern: 1 dst 15.200.225.32",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6147,
"protocol": 6,
"streamName": "meraki",
"clientIP": "195.211.173.209",
"serverIP": "15.200.225.32"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659654758.325734473 NORDC_MX400_1 flows src=195.211.173.209 dst=15.200.225.32 protocol=tcp sport=6147 dport=25 pattern: 1 dst 15.200.225.32 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.325734473 NORDC_MX400_1 flows src=195.211.173.209 dst=15.200.225.32 protocol=tcp sport=6147 dport=25 pattern: 1 dst 15.200.225.32 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6147
protocol: 6
streamName: meraki
clientIP: 195.211.173.209
serverIP: 15.200.225.32 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.464191852 NORDC_MX400_1 flows src=88.221.198.50 dst=121.188.187.136 protocol=tcp sport=21775 dport=25 pattern: 1 dst 121.188.187.136 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659654758.464191852 NORDC_MX400_1 flows src=88.221.198.50 dst=121.188.187.136 protocol=tcp sport=21775 dport=25 pattern: 1 dst 121.188.187.136",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 21775,
"protocol": 6,
"streamName": "meraki",
"clientIP": "88.221.198.50",
"serverIP": "121.188.187.136"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659654758.464191852 NORDC_MX400_1 flows src=88.221.198.50 dst=121.188.187.136 protocol=tcp sport=21775 dport=25 pattern: 1 dst 121.188.187.136 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.464191852 NORDC_MX400_1 flows src=88.221.198.50 dst=121.188.187.136 protocol=tcp sport=21775 dport=25 pattern: 1 dst 121.188.187.136 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 21775
protocol: 6
streamName: meraki
clientIP: 88.221.198.50
serverIP: 121.188.187.136 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.464191852 NORDC_MX400_1 flows src=18.5.152.34 dst=223.249.204.30 protocol=tcp sport=21775 dport=25 pattern: 1 dst 223.249.204.30 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659654758.464191852 NORDC_MX400_1 flows src=18.5.152.34 dst=223.249.204.30 protocol=tcp sport=21775 dport=25 pattern: 1 dst 223.249.204.30",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 21775,
"protocol": 6,
"streamName": "meraki",
"clientIP": "18.5.152.34",
"serverIP": "223.249.204.30"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659654758.464191852 NORDC_MX400_1 flows src=18.5.152.34 dst=223.249.204.30 protocol=tcp sport=21775 dport=25 pattern: 1 dst 223.249.204.30 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.464191852 NORDC_MX400_1 flows src=18.5.152.34 dst=223.249.204.30 protocol=tcp sport=21775 dport=25 pattern: 1 dst 223.249.204.30 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 21775
protocol: 6
streamName: meraki
clientIP: 18.5.152.34
serverIP: 223.249.204.30 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.524190679 NORDC_MX400_1 flows src=220.201.209.167 dst=213.199.121.45 protocol=tcp sport=42666 dport=25 pattern: 1 dst 213.199.121.45 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659654758.524190679 NORDC_MX400_1 flows src=220.201.209.167 dst=213.199.121.45 protocol=tcp sport=42666 dport=25 pattern: 1 dst 213.199.121.45",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 42666,
"protocol": 6,
"streamName": "meraki",
"clientIP": "220.201.209.167",
"serverIP": "213.199.121.45"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659654758.524190679 NORDC_MX400_1 flows src=220.201.209.167 dst=213.199.121.45 protocol=tcp sport=42666 dport=25 pattern: 1 dst 213.199.121.45 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.524190679 NORDC_MX400_1 flows src=220.201.209.167 dst=213.199.121.45 protocol=tcp sport=42666 dport=25 pattern: 1 dst 213.199.121.45 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 42666
protocol: 6
streamName: meraki
clientIP: 220.201.209.167
serverIP: 213.199.121.45 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.524190679 NORDC_MX400_1 flows src=17.36.151.159 dst=104.113.135.215 protocol=tcp sport=42666 dport=25 pattern: 1 dst 104.113.135.215 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659654758.524190679 NORDC_MX400_1 flows src=17.36.151.159 dst=104.113.135.215 protocol=tcp sport=42666 dport=25 pattern: 1 dst 104.113.135.215",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 42666,
"protocol": 6,
"streamName": "meraki",
"clientIP": "17.36.151.159",
"serverIP": "104.113.135.215"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659654758.524190679 NORDC_MX400_1 flows src=17.36.151.159 dst=104.113.135.215 protocol=tcp sport=42666 dport=25 pattern: 1 dst 104.113.135.215 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.524190679 NORDC_MX400_1 flows src=17.36.151.159 dst=104.113.135.215 protocol=tcp sport=42666 dport=25 pattern: 1 dst 104.113.135.215 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 42666
protocol: 6
streamName: meraki
clientIP: 17.36.151.159
serverIP: 104.113.135.215 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.274816116 NORDC_MX400_1 flows src=140.79.38.3 dst=127.95.74.52 protocol=tcp sport=51008 dport=25 pattern: 1 dst 127.95.74.52 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659654758.274816116 NORDC_MX400_1 flows src=140.79.38.3 dst=127.95.74.52 protocol=tcp sport=51008 dport=25 pattern: 1 dst 127.95.74.52",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 51008,
"protocol": 6,
"streamName": "meraki",
"clientIP": "140.79.38.3",
"serverIP": "127.95.74.52"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659654758.274816116 NORDC_MX400_1 flows src=140.79.38.3 dst=127.95.74.52 protocol=tcp sport=51008 dport=25 pattern: 1 dst 127.95.74.52 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.274816116 NORDC_MX400_1 flows src=140.79.38.3 dst=127.95.74.52 protocol=tcp sport=51008 dport=25 pattern: 1 dst 127.95.74.52 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 51008
protocol: 6
streamName: meraki
clientIP: 140.79.38.3
serverIP: 127.95.74.52 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.274816116 NORDC_MX400_1 flows src=48.186.139.119 dst=234.118.219.155 protocol=tcp sport=51008 dport=25 pattern: 1 dst 234.118.219.155 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659654758.274816116 NORDC_MX400_1 flows src=48.186.139.119 dst=234.118.219.155 protocol=tcp sport=51008 dport=25 pattern: 1 dst 234.118.219.155",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 51008,
"protocol": 6,
"streamName": "meraki",
"clientIP": "48.186.139.119",
"serverIP": "234.118.219.155"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659654758.274816116 NORDC_MX400_1 flows src=48.186.139.119 dst=234.118.219.155 protocol=tcp sport=51008 dport=25 pattern: 1 dst 234.118.219.155 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.274816116 NORDC_MX400_1 flows src=48.186.139.119 dst=234.118.219.155 protocol=tcp sport=51008 dport=25 pattern: 1 dst 234.118.219.155 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 51008
protocol: 6
streamName: meraki
clientIP: 48.186.139.119
serverIP: 234.118.219.155 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.334853799 NORDC_MX400_1 flows src=105.158.50.139 dst=34.15.249.113 protocol=tcp sport=57098 dport=25 pattern: 1 dst 34.15.249.113 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659654758.334853799 NORDC_MX400_1 flows src=105.158.50.139 dst=34.15.249.113 protocol=tcp sport=57098 dport=25 pattern: 1 dst 34.15.249.113",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 57098,
"protocol": 6,
"streamName": "meraki",
"clientIP": "105.158.50.139",
"serverIP": "34.15.249.113"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659654758.334853799 NORDC_MX400_1 flows src=105.158.50.139 dst=34.15.249.113 protocol=tcp sport=57098 dport=25 pattern: 1 dst 34.15.249.113 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.334853799 NORDC_MX400_1 flows src=105.158.50.139 dst=34.15.249.113 protocol=tcp sport=57098 dport=25 pattern: 1 dst 34.15.249.113 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 57098
protocol: 6
streamName: meraki
clientIP: 105.158.50.139
serverIP: 34.15.249.113 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.334853799 NORDC_MX400_1 flows src=189.115.41.143 dst=141.51.210.130 protocol=tcp sport=57098 dport=25 pattern: 1 dst 141.51.210.130 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659654758.334853799 NORDC_MX400_1 flows src=189.115.41.143 dst=141.51.210.130 protocol=tcp sport=57098 dport=25 pattern: 1 dst 141.51.210.130",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 57098,
"protocol": 6,
"streamName": "meraki",
"clientIP": "189.115.41.143",
"serverIP": "141.51.210.130"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659654758.334853799 NORDC_MX400_1 flows src=189.115.41.143 dst=141.51.210.130 protocol=tcp sport=57098 dport=25 pattern: 1 dst 141.51.210.130 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.334853799 NORDC_MX400_1 flows src=189.115.41.143 dst=141.51.210.130 protocol=tcp sport=57098 dport=25 pattern: 1 dst 141.51.210.130 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 57098
protocol: 6
streamName: meraki
clientIP: 189.115.41.143
serverIP: 141.51.210.130 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.358855026 NORDC_MX400_1 flows src=189.143.6.190 dst=65.100.40.215 protocol=tcp sport=15705 dport=25 pattern: 1 dst 65.100.40.215 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659654758.358855026 NORDC_MX400_1 flows src=189.143.6.190 dst=65.100.40.215 protocol=tcp sport=15705 dport=25 pattern: 1 dst 65.100.40.215",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 15705,
"protocol": 6,
"streamName": "meraki",
"clientIP": "189.143.6.190",
"serverIP": "65.100.40.215"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659654758.358855026 NORDC_MX400_1 flows src=189.143.6.190 dst=65.100.40.215 protocol=tcp sport=15705 dport=25 pattern: 1 dst 65.100.40.215 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.358855026 NORDC_MX400_1 flows src=189.143.6.190 dst=65.100.40.215 protocol=tcp sport=15705 dport=25 pattern: 1 dst 65.100.40.215 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 15705
protocol: 6
streamName: meraki
clientIP: 189.143.6.190
serverIP: 65.100.40.215 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.358855026 NORDC_MX400_1 flows src=222.183.206.5 dst=198.22.75.89 protocol=tcp sport=15705 dport=25 pattern: 1 dst 198.22.75.89 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659654758.358855026 NORDC_MX400_1 flows src=222.183.206.5 dst=198.22.75.89 protocol=tcp sport=15705 dport=25 pattern: 1 dst 198.22.75.89",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 15705,
"protocol": 6,
"streamName": "meraki",
"clientIP": "222.183.206.5",
"serverIP": "198.22.75.89"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659654758.358855026 NORDC_MX400_1 flows src=222.183.206.5 dst=198.22.75.89 protocol=tcp sport=15705 dport=25 pattern: 1 dst 198.22.75.89 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.358855026 NORDC_MX400_1 flows src=222.183.206.5 dst=198.22.75.89 protocol=tcp sport=15705 dport=25 pattern: 1 dst 198.22.75.89 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 15705
protocol: 6
streamName: meraki
clientIP: 222.183.206.5
serverIP: 198.22.75.89 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.326726751 NORDC_MX400_1 flows src=165.200.5.217 dst=214.25.203.53 protocol=tcp sport=6210 dport=25 pattern: 1 dst 214.25.203.53 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659654758.326726751 NORDC_MX400_1 flows src=165.200.5.217 dst=214.25.203.53 protocol=tcp sport=6210 dport=25 pattern: 1 dst 214.25.203.53",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6210,
"protocol": 6,
"streamName": "meraki",
"clientIP": "165.200.5.217",
"serverIP": "214.25.203.53"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659654758.326726751 NORDC_MX400_1 flows src=165.200.5.217 dst=214.25.203.53 protocol=tcp sport=6210 dport=25 pattern: 1 dst 214.25.203.53 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.326726751 NORDC_MX400_1 flows src=165.200.5.217 dst=214.25.203.53 protocol=tcp sport=6210 dport=25 pattern: 1 dst 214.25.203.53 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6210
protocol: 6
streamName: meraki
clientIP: 165.200.5.217
serverIP: 214.25.203.53 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.326726751 NORDC_MX400_1 flows src=160.202.236.235 dst=149.168.176.125 protocol=tcp sport=6210 dport=25 pattern: 1 dst 149.168.176.125 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659654758.326726751 NORDC_MX400_1 flows src=160.202.236.235 dst=149.168.176.125 protocol=tcp sport=6210 dport=25 pattern: 1 dst 149.168.176.125",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6210,
"protocol": 6,
"streamName": "meraki",
"clientIP": "160.202.236.235",
"serverIP": "149.168.176.125"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659654758.326726751 NORDC_MX400_1 flows src=160.202.236.235 dst=149.168.176.125 protocol=tcp sport=6210 dport=25 pattern: 1 dst 149.168.176.125 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.326726751 NORDC_MX400_1 flows src=160.202.236.235 dst=149.168.176.125 protocol=tcp sport=6210 dport=25 pattern: 1 dst 149.168.176.125 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6210
protocol: 6
streamName: meraki
clientIP: 160.202.236.235
serverIP: 149.168.176.125 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.439372556 NORDC_MX400_1 flows src=31.31.88.56 dst=69.242.97.109 protocol=tcp sport=32993 dport=25 pattern: 1 dst 69.242.97.109 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659654758.439372556 NORDC_MX400_1 flows src=31.31.88.56 dst=69.242.97.109 protocol=tcp sport=32993 dport=25 pattern: 1 dst 69.242.97.109",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 32993,
"protocol": 6,
"streamName": "meraki",
"clientIP": "31.31.88.56",
"serverIP": "69.242.97.109"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659654758.439372556 NORDC_MX400_1 flows src=31.31.88.56 dst=69.242.97.109 protocol=tcp sport=32993 dport=25 pattern: 1 dst 69.242.97.109 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.439372556 NORDC_MX400_1 flows src=31.31.88.56 dst=69.242.97.109 protocol=tcp sport=32993 dport=25 pattern: 1 dst 69.242.97.109 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 32993
protocol: 6
streamName: meraki
clientIP: 31.31.88.56
serverIP: 69.242.97.109 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.439372556 NORDC_MX400_1 flows src=188.118.9.240 dst=90.146.233.147 protocol=tcp sport=32993 dport=25 pattern: 1 dst 90.146.233.147 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659654758.439372556 NORDC_MX400_1 flows src=188.118.9.240 dst=90.146.233.147 protocol=tcp sport=32993 dport=25 pattern: 1 dst 90.146.233.147",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 32993,
"protocol": 6,
"streamName": "meraki",
"clientIP": "188.118.9.240",
"serverIP": "90.146.233.147"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659654758.439372556 NORDC_MX400_1 flows src=188.118.9.240 dst=90.146.233.147 protocol=tcp sport=32993 dport=25 pattern: 1 dst 90.146.233.147 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.439372556 NORDC_MX400_1 flows src=188.118.9.240 dst=90.146.233.147 protocol=tcp sport=32993 dport=25 pattern: 1 dst 90.146.233.147 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 32993
protocol: 6
streamName: meraki
clientIP: 188.118.9.240
serverIP: 90.146.233.147 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.456574995 NORDC_MX400_1 flows src=121.132.171.240 dst=249.14.61.20 protocol=tcp sport=56042 dport=25 pattern: 1 dst 249.14.61.20 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659654758.456574995 NORDC_MX400_1 flows src=121.132.171.240 dst=249.14.61.20 protocol=tcp sport=56042 dport=25 pattern: 1 dst 249.14.61.20",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 56042,
"protocol": 6,
"streamName": "meraki",
"clientIP": "121.132.171.240",
"serverIP": "249.14.61.20"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659654758.456574995 NORDC_MX400_1 flows src=121.132.171.240 dst=249.14.61.20 protocol=tcp sport=56042 dport=25 pattern: 1 dst 249.14.61.20 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.456574995 NORDC_MX400_1 flows src=121.132.171.240 dst=249.14.61.20 protocol=tcp sport=56042 dport=25 pattern: 1 dst 249.14.61.20 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 56042
protocol: 6
streamName: meraki
clientIP: 121.132.171.240
serverIP: 249.14.61.20 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.456574995 NORDC_MX400_1 flows src=77.89.158.6 dst=67.241.238.21 protocol=tcp sport=56042 dport=25 pattern: 1 dst 67.241.238.21 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659654758.456574995 NORDC_MX400_1 flows src=77.89.158.6 dst=67.241.238.21 protocol=tcp sport=56042 dport=25 pattern: 1 dst 67.241.238.21",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 56042,
"protocol": 6,
"streamName": "meraki",
"clientIP": "77.89.158.6",
"serverIP": "67.241.238.21"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659654758.456574995 NORDC_MX400_1 flows src=77.89.158.6 dst=67.241.238.21 protocol=tcp sport=56042 dport=25 pattern: 1 dst 67.241.238.21 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.456574995 NORDC_MX400_1 flows src=77.89.158.6 dst=67.241.238.21 protocol=tcp sport=56042 dport=25 pattern: 1 dst 67.241.238.21 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 56042
protocol: 6
streamName: meraki
clientIP: 77.89.158.6
serverIP: 67.241.238.21 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.441723968 NORDC_MX400_1 flows src=177.196.206.37 dst=75.166.192.126 protocol=tcp sport=6347 dport=25 pattern: 1 dst 75.166.192.126 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659654758.441723968 NORDC_MX400_1 flows src=177.196.206.37 dst=75.166.192.126 protocol=tcp sport=6347 dport=25 pattern: 1 dst 75.166.192.126",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6347,
"protocol": 6,
"streamName": "meraki",
"clientIP": "177.196.206.37",
"serverIP": "75.166.192.126"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659654758.441723968 NORDC_MX400_1 flows src=177.196.206.37 dst=75.166.192.126 protocol=tcp sport=6347 dport=25 pattern: 1 dst 75.166.192.126 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.441723968 NORDC_MX400_1 flows src=177.196.206.37 dst=75.166.192.126 protocol=tcp sport=6347 dport=25 pattern: 1 dst 75.166.192.126 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6347
protocol: 6
streamName: meraki
clientIP: 177.196.206.37
serverIP: 75.166.192.126 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.441723968 NORDC_MX400_1 flows src=196.76.219.61 dst=103.66.217.230 protocol=tcp sport=6347 dport=25 pattern: 1 dst 103.66.217.230 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659654758.441723968 NORDC_MX400_1 flows src=196.76.219.61 dst=103.66.217.230 protocol=tcp sport=6347 dport=25 pattern: 1 dst 103.66.217.230",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6347,
"protocol": 6,
"streamName": "meraki",
"clientIP": "196.76.219.61",
"serverIP": "103.66.217.230"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659654758.441723968 NORDC_MX400_1 flows src=196.76.219.61 dst=103.66.217.230 protocol=tcp sport=6347 dport=25 pattern: 1 dst 103.66.217.230 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.441723968 NORDC_MX400_1 flows src=196.76.219.61 dst=103.66.217.230 protocol=tcp sport=6347 dport=25 pattern: 1 dst 103.66.217.230 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6347
protocol: 6
streamName: meraki
clientIP: 196.76.219.61
serverIP: 103.66.217.230 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.431304369 NORDC_MX400_1 flows src=158.211.251.227 dst=67.233.37.88 protocol=tcp sport=6561 dport=25 pattern: 1 dst 67.233.37.88 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659654758.431304369 NORDC_MX400_1 flows src=158.211.251.227 dst=67.233.37.88 protocol=tcp sport=6561 dport=25 pattern: 1 dst 67.233.37.88",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6561,
"protocol": 6,
"streamName": "meraki",
"clientIP": "158.211.251.227",
"serverIP": "67.233.37.88"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659654758.431304369 NORDC_MX400_1 flows src=158.211.251.227 dst=67.233.37.88 protocol=tcp sport=6561 dport=25 pattern: 1 dst 67.233.37.88 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.431304369 NORDC_MX400_1 flows src=158.211.251.227 dst=67.233.37.88 protocol=tcp sport=6561 dport=25 pattern: 1 dst 67.233.37.88 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6561
protocol: 6
streamName: meraki
clientIP: 158.211.251.227
serverIP: 67.233.37.88 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.431304369 NORDC_MX400_1 flows src=124.203.237.244 dst=117.239.67.56 protocol=tcp sport=6561 dport=25 pattern: 1 dst 117.239.67.56 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659654758.431304369 NORDC_MX400_1 flows src=124.203.237.244 dst=117.239.67.56 protocol=tcp sport=6561 dport=25 pattern: 1 dst 117.239.67.56",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6561,
"protocol": 6,
"streamName": "meraki",
"clientIP": "124.203.237.244",
"serverIP": "117.239.67.56"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659654758.431304369 NORDC_MX400_1 flows src=124.203.237.244 dst=117.239.67.56 protocol=tcp sport=6561 dport=25 pattern: 1 dst 117.239.67.56 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.431304369 NORDC_MX400_1 flows src=124.203.237.244 dst=117.239.67.56 protocol=tcp sport=6561 dport=25 pattern: 1 dst 117.239.67.56 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6561
protocol: 6
streamName: meraki
clientIP: 124.203.237.244
serverIP: 117.239.67.56 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659654758.459507921 NORDC_MX400_1 flows src=46.119.5.106 dst=139.11.243.232 protocol=tcp sport=30357 dport=25 pattern: 1 dst 139.11.243.232 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659654758.459507921 NORDC_MX400_1 flows src=46.119.5.106 dst=139.11.243.232 protocol=tcp sport=30357 dport=25 pattern: 1 dst 139.11.243.232",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 30357,
"protocol": 6,
"streamName": "meraki",
"clientIP": "46.119.5.106",
"serverIP": "139.11.243.232"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659654758.459507921 NORDC_MX400_1 flows src=46.119.5.106 dst=139.11.243.232 protocol=tcp sport=30357 dport=25 pattern: 1 dst 139.11.243.232 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.