input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<134>Original Address=192.168.2.253 1 1681042592.008971010 NORDC_MX400_1 flows src=121.106.255.22 dst=169.154.84.129 protocol=tcp sport=8992 dport=25 pattern: 1 dst 169.154.84.129 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 8992
protocol: 6
streamName: meraki
clientIP: 121.106.255.22
serverIP: 169.154.84.129 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1681042592.008971010 NORDC_MX400_1 flows src=229.53.186.141 dst=22.154.5.139 protocol=tcp sport=8992 dport=25 pattern: 1 dst 22.154.5.139 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1681042592.008971010 NORDC_MX400_1 flows src=229.53.186.141 dst=22.154.5.139 protocol=tcp sport=8992 dport=25 pattern: 1 dst 22.154.5.139",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 8992,
"protocol": 6,
"streamName": "meraki",
"clientIP": "229.53.186.141",
"serverIP": "22.154.5.139"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1681042592.008971010 NORDC_MX400_1 flows src=229.53.186.141 dst=22.154.5.139 protocol=tcp sport=8992 dport=25 pattern: 1 dst 22.154.5.139 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1681042592.008971010 NORDC_MX400_1 flows src=229.53.186.141 dst=22.154.5.139 protocol=tcp sport=8992 dport=25 pattern: 1 dst 22.154.5.139 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 8992
protocol: 6
streamName: meraki
clientIP: 229.53.186.141
serverIP: 22.154.5.139 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1681042592.005942037 NORDC_MX400_1 flows src=203.167.136.123 dst=140.11.33.79 protocol=tcp sport=6139 dport=25 pattern: 1 dst 140.11.33.79 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1681042592.005942037 NORDC_MX400_1 flows src=203.167.136.123 dst=140.11.33.79 protocol=tcp sport=6139 dport=25 pattern: 1 dst 140.11.33.79",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6139,
"protocol": 6,
"streamName": "meraki",
"clientIP": "203.167.136.123",
"serverIP": "140.11.33.79"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1681042592.005942037 NORDC_MX400_1 flows src=203.167.136.123 dst=140.11.33.79 protocol=tcp sport=6139 dport=25 pattern: 1 dst 140.11.33.79 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1681042592.005942037 NORDC_MX400_1 flows src=203.167.136.123 dst=140.11.33.79 protocol=tcp sport=6139 dport=25 pattern: 1 dst 140.11.33.79 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6139
protocol: 6
streamName: meraki
clientIP: 203.167.136.123
serverIP: 140.11.33.79 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1681042592.005942037 NORDC_MX400_1 flows src=34.40.198.73 dst=87.159.245.21 protocol=tcp sport=6139 dport=25 pattern: 1 dst 87.159.245.21 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1681042592.005942037 NORDC_MX400_1 flows src=34.40.198.73 dst=87.159.245.21 protocol=tcp sport=6139 dport=25 pattern: 1 dst 87.159.245.21",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6139,
"protocol": 6,
"streamName": "meraki",
"clientIP": "34.40.198.73",
"serverIP": "87.159.245.21"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1681042592.005942037 NORDC_MX400_1 flows src=34.40.198.73 dst=87.159.245.21 protocol=tcp sport=6139 dport=25 pattern: 1 dst 87.159.245.21 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1681042592.005942037 NORDC_MX400_1 flows src=34.40.198.73 dst=87.159.245.21 protocol=tcp sport=6139 dport=25 pattern: 1 dst 87.159.245.21 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6139
protocol: 6
streamName: meraki
clientIP: 34.40.198.73
serverIP: 87.159.245.21 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1681042592.013329727 NORDC_MX400_1 flows src=98.194.37.195 dst=230.149.119.44 protocol=tcp sport=1633 dport=25 pattern: 1 dst 230.149.119.44 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1681042592.013329727 NORDC_MX400_1 flows src=98.194.37.195 dst=230.149.119.44 protocol=tcp sport=1633 dport=25 pattern: 1 dst 230.149.119.44",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 1633,
"protocol": 6,
"streamName": "meraki",
"clientIP": "98.194.37.195",
"serverIP": "230.149.119.44"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1681042592.013329727 NORDC_MX400_1 flows src=98.194.37.195 dst=230.149.119.44 protocol=tcp sport=1633 dport=25 pattern: 1 dst 230.149.119.44 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1681042592.013329727 NORDC_MX400_1 flows src=98.194.37.195 dst=230.149.119.44 protocol=tcp sport=1633 dport=25 pattern: 1 dst 230.149.119.44 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 1633
protocol: 6
streamName: meraki
clientIP: 98.194.37.195
serverIP: 230.149.119.44 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1681042592.013329727 NORDC_MX400_1 flows src=244.205.196.66 dst=219.80.105.20 protocol=tcp sport=1633 dport=25 pattern: 1 dst 219.80.105.20 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1681042592.013329727 NORDC_MX400_1 flows src=244.205.196.66 dst=219.80.105.20 protocol=tcp sport=1633 dport=25 pattern: 1 dst 219.80.105.20",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 1633,
"protocol": 6,
"streamName": "meraki",
"clientIP": "244.205.196.66",
"serverIP": "219.80.105.20"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1681042592.013329727 NORDC_MX400_1 flows src=244.205.196.66 dst=219.80.105.20 protocol=tcp sport=1633 dport=25 pattern: 1 dst 219.80.105.20 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1681042592.013329727 NORDC_MX400_1 flows src=244.205.196.66 dst=219.80.105.20 protocol=tcp sport=1633 dport=25 pattern: 1 dst 219.80.105.20 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 1633
protocol: 6
streamName: meraki
clientIP: 244.205.196.66
serverIP: 219.80.105.20 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1681042592.199138397 NORDC_MX400_1 flows src=78.95.16.151 dst=78.111.99.92 protocol=tcp sport=47712 dport=25 pattern: 1 dst 78.111.99.92 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1681042592.199138397 NORDC_MX400_1 flows src=78.95.16.151 dst=78.111.99.92 protocol=tcp sport=47712 dport=25 pattern: 1 dst 78.111.99.92",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 47712,
"protocol": 6,
"streamName": "meraki",
"clientIP": "78.95.16.151",
"serverIP": "78.111.99.92"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1681042592.199138397 NORDC_MX400_1 flows src=78.95.16.151 dst=78.111.99.92 protocol=tcp sport=47712 dport=25 pattern: 1 dst 78.111.99.92 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1681042592.199138397 NORDC_MX400_1 flows src=78.95.16.151 dst=78.111.99.92 protocol=tcp sport=47712 dport=25 pattern: 1 dst 78.111.99.92 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 47712
protocol: 6
streamName: meraki
clientIP: 78.95.16.151
serverIP: 78.111.99.92 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1681042592.199138397 NORDC_MX400_1 flows src=136.222.173.81 dst=250.25.252.25 protocol=tcp sport=47712 dport=25 pattern: 1 dst 250.25.252.25 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1681042592.199138397 NORDC_MX400_1 flows src=136.222.173.81 dst=250.25.252.25 protocol=tcp sport=47712 dport=25 pattern: 1 dst 250.25.252.25",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 47712,
"protocol": 6,
"streamName": "meraki",
"clientIP": "136.222.173.81",
"serverIP": "250.25.252.25"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1681042592.199138397 NORDC_MX400_1 flows src=136.222.173.81 dst=250.25.252.25 protocol=tcp sport=47712 dport=25 pattern: 1 dst 250.25.252.25 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1681042592.199138397 NORDC_MX400_1 flows src=136.222.173.81 dst=250.25.252.25 protocol=tcp sport=47712 dport=25 pattern: 1 dst 250.25.252.25 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 47712
protocol: 6
streamName: meraki
clientIP: 136.222.173.81
serverIP: 250.25.252.25 | Explain this syslog message |
<134>Original Address=197.71.5.59 1 1673915350.527440424 M162_MX67C_SavCCG flows src=171.40.187.71 dst=197.71.5.59 protocol=tcp sport=51748 dport=8080 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 8080,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=197.71.5.59 1 1673915350.527440424 M162_MX67C_SavCCG flows src=171.40.187.71 dst=197.71.5.59 protocol=tcp sport=51748 dport=8080 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 51748,
"protocol": 6,
"streamName": "meraki",
"clientIP": "171.40.187.71",
"serverIP": "197.71.5.59"
} | Create a JSON artifact from the message |
<134>Original Address=197.71.5.59 1 1673915350.527440424 M162_MX67C_SavCCG flows src=171.40.187.71 dst=197.71.5.59 protocol=tcp sport=51748 dport=8080 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=197.71.5.59 1 1673915350.527440424 M162_MX67C_SavCCG flows src=171.40.187.71 dst=197.71.5.59 protocol=tcp sport=51748 dport=8080 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 8080
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 51748
protocol: 6
streamName: meraki
clientIP: 171.40.187.71
serverIP: 197.71.5.59 | Explain this syslog message |
<134>Original Address=182.196.42.16 1 1673915350.527440424 M162_MX67C_SavCCG flows src=202.126.187.211 dst=182.196.42.16 protocol=tcp sport=51748 dport=8080 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 8080,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=182.196.42.16 1 1673915350.527440424 M162_MX67C_SavCCG flows src=202.126.187.211 dst=182.196.42.16 protocol=tcp sport=51748 dport=8080 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 51748,
"protocol": 6,
"streamName": "meraki",
"clientIP": "202.126.187.211",
"serverIP": "182.196.42.16"
} | Create a JSON artifact from the message |
<134>Original Address=182.196.42.16 1 1673915350.527440424 M162_MX67C_SavCCG flows src=202.126.187.211 dst=182.196.42.16 protocol=tcp sport=51748 dport=8080 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=182.196.42.16 1 1673915350.527440424 M162_MX67C_SavCCG flows src=202.126.187.211 dst=182.196.42.16 protocol=tcp sport=51748 dport=8080 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 8080
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 51748
protocol: 6
streamName: meraki
clientIP: 202.126.187.211
serverIP: 182.196.42.16 | Explain this syslog message |
<134>Original Address=124.212.232.150 1 1673915350.527440424 M162_MX67C_SavCCG flows src=173.55.171.95 dst=124.212.232.150 protocol=tcp sport=51748 dport=8080 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 8080,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=124.212.232.150 1 1673915350.527440424 M162_MX67C_SavCCG flows src=173.55.171.95 dst=124.212.232.150 protocol=tcp sport=51748 dport=8080 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 51748,
"protocol": 6,
"streamName": "meraki",
"clientIP": "173.55.171.95",
"serverIP": "124.212.232.150"
} | Create a JSON artifact from the message |
<134>Original Address=124.212.232.150 1 1673915350.527440424 M162_MX67C_SavCCG flows src=173.55.171.95 dst=124.212.232.150 protocol=tcp sport=51748 dport=8080 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=124.212.232.150 1 1673915350.527440424 M162_MX67C_SavCCG flows src=173.55.171.95 dst=124.212.232.150 protocol=tcp sport=51748 dport=8080 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 8080
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 51748
protocol: 6
streamName: meraki
clientIP: 173.55.171.95
serverIP: 124.212.232.150 | Explain this syslog message |
<134>Original Address=1.77.176.22 1 1673915350.527440424 M162_MX67C_SavCCG flows src=49.221.174.227 dst=1.77.176.22 protocol=tcp sport=51748 dport=8080 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 8080,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=1.77.176.22 1 1673915350.527440424 M162_MX67C_SavCCG flows src=49.221.174.227 dst=1.77.176.22 protocol=tcp sport=51748 dport=8080 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 51748,
"protocol": 6,
"streamName": "meraki",
"clientIP": "49.221.174.227",
"serverIP": "1.77.176.22"
} | Create a JSON artifact from the message |
<134>Original Address=1.77.176.22 1 1673915350.527440424 M162_MX67C_SavCCG flows src=49.221.174.227 dst=1.77.176.22 protocol=tcp sport=51748 dport=8080 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=1.77.176.22 1 1673915350.527440424 M162_MX67C_SavCCG flows src=49.221.174.227 dst=1.77.176.22 protocol=tcp sport=51748 dport=8080 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 8080
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 51748
protocol: 6
streamName: meraki
clientIP: 49.221.174.227
serverIP: 1.77.176.22 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1673915351.069310375 M34_MX67C_Atlanta flows src=254.49.99.154 dst=35.67.59.90 protocol=tcp sport=58226 dport=9214 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9214,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1673915351.069310375 M34_MX67C_Atlanta flows src=254.49.99.154 dst=35.67.59.90 protocol=tcp sport=58226 dport=9214 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 58226,
"protocol": 6,
"streamName": "meraki",
"clientIP": "254.49.99.154",
"serverIP": "35.67.59.90"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1673915351.069310375 M34_MX67C_Atlanta flows src=254.49.99.154 dst=35.67.59.90 protocol=tcp sport=58226 dport=9214 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1673915351.069310375 M34_MX67C_Atlanta flows src=254.49.99.154 dst=35.67.59.90 protocol=tcp sport=58226 dport=9214 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9214
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 58226
protocol: 6
streamName: meraki
clientIP: 254.49.99.154
serverIP: 35.67.59.90 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1673915351.069310375 M34_MX67C_Atlanta flows src=169.65.89.204 dst=135.63.25.208 protocol=tcp sport=58226 dport=9214 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9214,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1673915351.069310375 M34_MX67C_Atlanta flows src=169.65.89.204 dst=135.63.25.208 protocol=tcp sport=58226 dport=9214 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 58226,
"protocol": 6,
"streamName": "meraki",
"clientIP": "169.65.89.204",
"serverIP": "135.63.25.208"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1673915351.069310375 M34_MX67C_Atlanta flows src=169.65.89.204 dst=135.63.25.208 protocol=tcp sport=58226 dport=9214 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1673915351.069310375 M34_MX67C_Atlanta flows src=169.65.89.204 dst=135.63.25.208 protocol=tcp sport=58226 dport=9214 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9214
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 58226
protocol: 6
streamName: meraki
clientIP: 169.65.89.204
serverIP: 135.63.25.208 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1673915351.069310375 M34_MX67C_Atlanta flows src=61.220.12.116 dst=111.203.197.53 protocol=tcp sport=58226 dport=9214 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9214,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1673915351.069310375 M34_MX67C_Atlanta flows src=61.220.12.116 dst=111.203.197.53 protocol=tcp sport=58226 dport=9214 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 58226,
"protocol": 6,
"streamName": "meraki",
"clientIP": "61.220.12.116",
"serverIP": "111.203.197.53"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1673915351.069310375 M34_MX67C_Atlanta flows src=61.220.12.116 dst=111.203.197.53 protocol=tcp sport=58226 dport=9214 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1673915351.069310375 M34_MX67C_Atlanta flows src=61.220.12.116 dst=111.203.197.53 protocol=tcp sport=58226 dport=9214 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9214
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 58226
protocol: 6
streamName: meraki
clientIP: 61.220.12.116
serverIP: 111.203.197.53 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1673915351.069310375 M34_MX67C_Atlanta flows src=67.10.72.214 dst=74.211.131.141 protocol=tcp sport=58226 dport=9214 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9214,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1673915351.069310375 M34_MX67C_Atlanta flows src=67.10.72.214 dst=74.211.131.141 protocol=tcp sport=58226 dport=9214 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 58226,
"protocol": 6,
"streamName": "meraki",
"clientIP": "67.10.72.214",
"serverIP": "74.211.131.141"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1673915351.069310375 M34_MX67C_Atlanta flows src=67.10.72.214 dst=74.211.131.141 protocol=tcp sport=58226 dport=9214 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1673915351.069310375 M34_MX67C_Atlanta flows src=67.10.72.214 dst=74.211.131.141 protocol=tcp sport=58226 dport=9214 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9214
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 58226
protocol: 6
streamName: meraki
clientIP: 67.10.72.214
serverIP: 74.211.131.141 | Explain this syslog message |
<134>Original Address=96.73.220.25 1 1673915370.508446775 M38_MX67C_Conyers flows src=249.60.161.112 dst=170.237.24.211 protocol=tcp sport=53761 dport=9214 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9214,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.220.25 1 1673915370.508446775 M38_MX67C_Conyers flows src=249.60.161.112 dst=170.237.24.211 protocol=tcp sport=53761 dport=9214 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 53761,
"protocol": 6,
"streamName": "meraki",
"clientIP": "249.60.161.112",
"serverIP": "170.237.24.211"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.220.25 1 1673915370.508446775 M38_MX67C_Conyers flows src=249.60.161.112 dst=170.237.24.211 protocol=tcp sport=53761 dport=9214 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.220.25 1 1673915370.508446775 M38_MX67C_Conyers flows src=249.60.161.112 dst=170.237.24.211 protocol=tcp sport=53761 dport=9214 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9214
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 53761
protocol: 6
streamName: meraki
clientIP: 249.60.161.112
serverIP: 170.237.24.211 | Explain this syslog message |
<134>Original Address=96.73.220.25 1 1673915370.508446775 M38_MX67C_Conyers flows src=248.88.98.161 dst=27.232.142.33 protocol=tcp sport=53761 dport=9214 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9214,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.220.25 1 1673915370.508446775 M38_MX67C_Conyers flows src=248.88.98.161 dst=27.232.142.33 protocol=tcp sport=53761 dport=9214 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 53761,
"protocol": 6,
"streamName": "meraki",
"clientIP": "248.88.98.161",
"serverIP": "27.232.142.33"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.220.25 1 1673915370.508446775 M38_MX67C_Conyers flows src=248.88.98.161 dst=27.232.142.33 protocol=tcp sport=53761 dport=9214 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.220.25 1 1673915370.508446775 M38_MX67C_Conyers flows src=248.88.98.161 dst=27.232.142.33 protocol=tcp sport=53761 dport=9214 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9214
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 53761
protocol: 6
streamName: meraki
clientIP: 248.88.98.161
serverIP: 27.232.142.33 | Explain this syslog message |
<134>Original Address=96.73.220.25 1 1673915370.508446775 M38_MX67C_Conyers flows src=117.108.135.61 dst=101.96.196.208 protocol=tcp sport=53761 dport=9214 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9214,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.220.25 1 1673915370.508446775 M38_MX67C_Conyers flows src=117.108.135.61 dst=101.96.196.208 protocol=tcp sport=53761 dport=9214 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 53761,
"protocol": 6,
"streamName": "meraki",
"clientIP": "117.108.135.61",
"serverIP": "101.96.196.208"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.220.25 1 1673915370.508446775 M38_MX67C_Conyers flows src=117.108.135.61 dst=101.96.196.208 protocol=tcp sport=53761 dport=9214 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.220.25 1 1673915370.508446775 M38_MX67C_Conyers flows src=117.108.135.61 dst=101.96.196.208 protocol=tcp sport=53761 dport=9214 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9214
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 53761
protocol: 6
streamName: meraki
clientIP: 117.108.135.61
serverIP: 101.96.196.208 | Explain this syslog message |
<134>Original Address=96.73.220.25 1 1673915370.508446775 M38_MX67C_Conyers flows src=28.122.103.252 dst=222.37.34.96 protocol=tcp sport=53761 dport=9214 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9214,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.220.25 1 1673915370.508446775 M38_MX67C_Conyers flows src=28.122.103.252 dst=222.37.34.96 protocol=tcp sport=53761 dport=9214 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 53761,
"protocol": 6,
"streamName": "meraki",
"clientIP": "28.122.103.252",
"serverIP": "222.37.34.96"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.220.25 1 1673915370.508446775 M38_MX67C_Conyers flows src=28.122.103.252 dst=222.37.34.96 protocol=tcp sport=53761 dport=9214 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.220.25 1 1673915370.508446775 M38_MX67C_Conyers flows src=28.122.103.252 dst=222.37.34.96 protocol=tcp sport=53761 dport=9214 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9214
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 53761
protocol: 6
streamName: meraki
clientIP: 28.122.103.252
serverIP: 222.37.34.96 | Explain this syslog message |
<134>Original Address=64.139.91.93 1 1673915368.586570897 M64_MX67C_Augusta flows src=156.156.228.199 dst=52.25.220.136 protocol=tcp sport=59295 dport=9214 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9214,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=64.139.91.93 1 1673915368.586570897 M64_MX67C_Augusta flows src=156.156.228.199 dst=52.25.220.136 protocol=tcp sport=59295 dport=9214 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 59295,
"protocol": 6,
"streamName": "meraki",
"clientIP": "156.156.228.199",
"serverIP": "52.25.220.136"
} | Create a JSON artifact from the message |
<134>Original Address=64.139.91.93 1 1673915368.586570897 M64_MX67C_Augusta flows src=156.156.228.199 dst=52.25.220.136 protocol=tcp sport=59295 dport=9214 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=64.139.91.93 1 1673915368.586570897 M64_MX67C_Augusta flows src=156.156.228.199 dst=52.25.220.136 protocol=tcp sport=59295 dport=9214 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9214
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 59295
protocol: 6
streamName: meraki
clientIP: 156.156.228.199
serverIP: 52.25.220.136 | Explain this syslog message |
<134>Original Address=64.139.91.93 1 1673915368.586570897 M64_MX67C_Augusta flows src=190.59.28.250 dst=207.5.82.7 protocol=tcp sport=59295 dport=9214 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9214,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=64.139.91.93 1 1673915368.586570897 M64_MX67C_Augusta flows src=190.59.28.250 dst=207.5.82.7 protocol=tcp sport=59295 dport=9214 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 59295,
"protocol": 6,
"streamName": "meraki",
"clientIP": "190.59.28.250",
"serverIP": "207.5.82.7"
} | Create a JSON artifact from the message |
<134>Original Address=64.139.91.93 1 1673915368.586570897 M64_MX67C_Augusta flows src=190.59.28.250 dst=207.5.82.7 protocol=tcp sport=59295 dport=9214 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=64.139.91.93 1 1673915368.586570897 M64_MX67C_Augusta flows src=190.59.28.250 dst=207.5.82.7 protocol=tcp sport=59295 dport=9214 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9214
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 59295
protocol: 6
streamName: meraki
clientIP: 190.59.28.250
serverIP: 207.5.82.7 | Explain this syslog message |
<134>Original Address=64.139.91.93 1 1673915368.586570897 M64_MX67C_Augusta flows src=87.247.24.79 dst=222.253.167.112 protocol=tcp sport=59295 dport=9214 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9214,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=64.139.91.93 1 1673915368.586570897 M64_MX67C_Augusta flows src=87.247.24.79 dst=222.253.167.112 protocol=tcp sport=59295 dport=9214 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 59295,
"protocol": 6,
"streamName": "meraki",
"clientIP": "87.247.24.79",
"serverIP": "222.253.167.112"
} | Create a JSON artifact from the message |
<134>Original Address=64.139.91.93 1 1673915368.586570897 M64_MX67C_Augusta flows src=87.247.24.79 dst=222.253.167.112 protocol=tcp sport=59295 dport=9214 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=64.139.91.93 1 1673915368.586570897 M64_MX67C_Augusta flows src=87.247.24.79 dst=222.253.167.112 protocol=tcp sport=59295 dport=9214 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9214
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 59295
protocol: 6
streamName: meraki
clientIP: 87.247.24.79
serverIP: 222.253.167.112 | Explain this syslog message |
<134>Original Address=64.139.91.93 1 1673915368.586570897 M64_MX67C_Augusta flows src=109.243.213.85 dst=18.115.241.59 protocol=tcp sport=59295 dport=9214 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9214,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=64.139.91.93 1 1673915368.586570897 M64_MX67C_Augusta flows src=109.243.213.85 dst=18.115.241.59 protocol=tcp sport=59295 dport=9214 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 59295,
"protocol": 6,
"streamName": "meraki",
"clientIP": "109.243.213.85",
"serverIP": "18.115.241.59"
} | Create a JSON artifact from the message |
<134>Original Address=64.139.91.93 1 1673915368.586570897 M64_MX67C_Augusta flows src=109.243.213.85 dst=18.115.241.59 protocol=tcp sport=59295 dport=9214 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=64.139.91.93 1 1673915368.586570897 M64_MX67C_Augusta flows src=109.243.213.85 dst=18.115.241.59 protocol=tcp sport=59295 dport=9214 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9214
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 59295
protocol: 6
streamName: meraki
clientIP: 109.243.213.85
serverIP: 18.115.241.59 | Explain this syslog message |
<134>Original Address=96.82.21.145 1 1673915357.775177272 M82_MX67C_Huntsville flows src=165.96.194.11 dst=184.93.34.82 protocol=tcp sport=33293 dport=9207 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9207,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.82.21.145 1 1673915357.775177272 M82_MX67C_Huntsville flows src=165.96.194.11 dst=184.93.34.82 protocol=tcp sport=33293 dport=9207 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 33293,
"protocol": 6,
"streamName": "meraki",
"clientIP": "165.96.194.11",
"serverIP": "184.93.34.82"
} | Create a JSON artifact from the message |
<134>Original Address=96.82.21.145 1 1673915357.775177272 M82_MX67C_Huntsville flows src=165.96.194.11 dst=184.93.34.82 protocol=tcp sport=33293 dport=9207 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.82.21.145 1 1673915357.775177272 M82_MX67C_Huntsville flows src=165.96.194.11 dst=184.93.34.82 protocol=tcp sport=33293 dport=9207 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9207
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 33293
protocol: 6
streamName: meraki
clientIP: 165.96.194.11
serverIP: 184.93.34.82 | Explain this syslog message |
<134>Original Address=96.82.21.145 1 1673915357.775177272 M82_MX67C_Huntsville flows src=75.24.179.34 dst=170.90.101.119 protocol=tcp sport=33293 dport=9207 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9207,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.82.21.145 1 1673915357.775177272 M82_MX67C_Huntsville flows src=75.24.179.34 dst=170.90.101.119 protocol=tcp sport=33293 dport=9207 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 33293,
"protocol": 6,
"streamName": "meraki",
"clientIP": "75.24.179.34",
"serverIP": "170.90.101.119"
} | Create a JSON artifact from the message |
<134>Original Address=96.82.21.145 1 1673915357.775177272 M82_MX67C_Huntsville flows src=75.24.179.34 dst=170.90.101.119 protocol=tcp sport=33293 dport=9207 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.82.21.145 1 1673915357.775177272 M82_MX67C_Huntsville flows src=75.24.179.34 dst=170.90.101.119 protocol=tcp sport=33293 dport=9207 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9207
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 33293
protocol: 6
streamName: meraki
clientIP: 75.24.179.34
serverIP: 170.90.101.119 | Explain this syslog message |
<134>Original Address=96.82.21.145 1 1673915357.775177272 M82_MX67C_Huntsville flows src=42.182.217.205 dst=57.94.101.216 protocol=tcp sport=33293 dport=9207 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9207,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.82.21.145 1 1673915357.775177272 M82_MX67C_Huntsville flows src=42.182.217.205 dst=57.94.101.216 protocol=tcp sport=33293 dport=9207 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 33293,
"protocol": 6,
"streamName": "meraki",
"clientIP": "42.182.217.205",
"serverIP": "57.94.101.216"
} | Create a JSON artifact from the message |
<134>Original Address=96.82.21.145 1 1673915357.775177272 M82_MX67C_Huntsville flows src=42.182.217.205 dst=57.94.101.216 protocol=tcp sport=33293 dport=9207 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.82.21.145 1 1673915357.775177272 M82_MX67C_Huntsville flows src=42.182.217.205 dst=57.94.101.216 protocol=tcp sport=33293 dport=9207 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9207
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 33293
protocol: 6
streamName: meraki
clientIP: 42.182.217.205
serverIP: 57.94.101.216 | Explain this syslog message |
<134>Original Address=96.82.21.145 1 1673915357.775177272 M82_MX67C_Huntsville flows src=15.10.89.240 dst=68.83.80.34 protocol=tcp sport=33293 dport=9207 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9207,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.82.21.145 1 1673915357.775177272 M82_MX67C_Huntsville flows src=15.10.89.240 dst=68.83.80.34 protocol=tcp sport=33293 dport=9207 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 33293,
"protocol": 6,
"streamName": "meraki",
"clientIP": "15.10.89.240",
"serverIP": "68.83.80.34"
} | Create a JSON artifact from the message |
<134>Original Address=96.82.21.145 1 1673915357.775177272 M82_MX67C_Huntsville flows src=15.10.89.240 dst=68.83.80.34 protocol=tcp sport=33293 dport=9207 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.82.21.145 1 1673915357.775177272 M82_MX67C_Huntsville flows src=15.10.89.240 dst=68.83.80.34 protocol=tcp sport=33293 dport=9207 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9207
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 33293
protocol: 6
streamName: meraki
clientIP: 15.10.89.240
serverIP: 68.83.80.34 | Explain this syslog message |
<134>Original Address=96.73.220.25 1 1673915361.224359295 M38_MX67C_Conyers flows src=213.234.9.65 dst=116.252.92.190 protocol=tcp sport=36729 dport=9207 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9207,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.220.25 1 1673915361.224359295 M38_MX67C_Conyers flows src=213.234.9.65 dst=116.252.92.190 protocol=tcp sport=36729 dport=9207 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 36729,
"protocol": 6,
"streamName": "meraki",
"clientIP": "213.234.9.65",
"serverIP": "116.252.92.190"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.220.25 1 1673915361.224359295 M38_MX67C_Conyers flows src=213.234.9.65 dst=116.252.92.190 protocol=tcp sport=36729 dport=9207 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.220.25 1 1673915361.224359295 M38_MX67C_Conyers flows src=213.234.9.65 dst=116.252.92.190 protocol=tcp sport=36729 dport=9207 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9207
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 36729
protocol: 6
streamName: meraki
clientIP: 213.234.9.65
serverIP: 116.252.92.190 | Explain this syslog message |
<134>Original Address=96.73.220.25 1 1673915361.224359295 M38_MX67C_Conyers flows src=206.55.62.10 dst=171.87.1.252 protocol=tcp sport=36729 dport=9207 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9207,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.220.25 1 1673915361.224359295 M38_MX67C_Conyers flows src=206.55.62.10 dst=171.87.1.252 protocol=tcp sport=36729 dport=9207 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 36729,
"protocol": 6,
"streamName": "meraki",
"clientIP": "206.55.62.10",
"serverIP": "171.87.1.252"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.220.25 1 1673915361.224359295 M38_MX67C_Conyers flows src=206.55.62.10 dst=171.87.1.252 protocol=tcp sport=36729 dport=9207 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.220.25 1 1673915361.224359295 M38_MX67C_Conyers flows src=206.55.62.10 dst=171.87.1.252 protocol=tcp sport=36729 dport=9207 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9207
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 36729
protocol: 6
streamName: meraki
clientIP: 206.55.62.10
serverIP: 171.87.1.252 | Explain this syslog message |
<134>Original Address=96.73.220.25 1 1673915361.224359295 M38_MX67C_Conyers flows src=55.23.69.159 dst=209.1.196.3 protocol=tcp sport=36729 dport=9207 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9207,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.220.25 1 1673915361.224359295 M38_MX67C_Conyers flows src=55.23.69.159 dst=209.1.196.3 protocol=tcp sport=36729 dport=9207 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 36729,
"protocol": 6,
"streamName": "meraki",
"clientIP": "55.23.69.159",
"serverIP": "209.1.196.3"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.220.25 1 1673915361.224359295 M38_MX67C_Conyers flows src=55.23.69.159 dst=209.1.196.3 protocol=tcp sport=36729 dport=9207 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.220.25 1 1673915361.224359295 M38_MX67C_Conyers flows src=55.23.69.159 dst=209.1.196.3 protocol=tcp sport=36729 dport=9207 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9207
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 36729
protocol: 6
streamName: meraki
clientIP: 55.23.69.159
serverIP: 209.1.196.3 | Explain this syslog message |
<134>Original Address=96.73.220.25 1 1673915361.224359295 M38_MX67C_Conyers flows src=234.8.228.37 dst=156.255.143.237 protocol=tcp sport=36729 dport=9207 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9207,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.220.25 1 1673915361.224359295 M38_MX67C_Conyers flows src=234.8.228.37 dst=156.255.143.237 protocol=tcp sport=36729 dport=9207 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 36729,
"protocol": 6,
"streamName": "meraki",
"clientIP": "234.8.228.37",
"serverIP": "156.255.143.237"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.220.25 1 1673915361.224359295 M38_MX67C_Conyers flows src=234.8.228.37 dst=156.255.143.237 protocol=tcp sport=36729 dport=9207 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.220.25 1 1673915361.224359295 M38_MX67C_Conyers flows src=234.8.228.37 dst=156.255.143.237 protocol=tcp sport=36729 dport=9207 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9207
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 36729
protocol: 6
streamName: meraki
clientIP: 234.8.228.37
serverIP: 156.255.143.237 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1673915368.754759350 M61_MX67C_Savannah flows src=147.249.234.0 dst=220.192.219.26 protocol=tcp sport=57317 dport=9207 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9207,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1673915368.754759350 M61_MX67C_Savannah flows src=147.249.234.0 dst=220.192.219.26 protocol=tcp sport=57317 dport=9207 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 57317,
"protocol": 6,
"streamName": "meraki",
"clientIP": "147.249.234.0",
"serverIP": "220.192.219.26"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1673915368.754759350 M61_MX67C_Savannah flows src=147.249.234.0 dst=220.192.219.26 protocol=tcp sport=57317 dport=9207 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1673915368.754759350 M61_MX67C_Savannah flows src=147.249.234.0 dst=220.192.219.26 protocol=tcp sport=57317 dport=9207 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9207
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 57317
protocol: 6
streamName: meraki
clientIP: 147.249.234.0
serverIP: 220.192.219.26 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1673915368.754759350 M61_MX67C_Savannah flows src=105.107.1.36 dst=135.229.164.250 protocol=tcp sport=57317 dport=9207 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9207,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1673915368.754759350 M61_MX67C_Savannah flows src=105.107.1.36 dst=135.229.164.250 protocol=tcp sport=57317 dport=9207 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 57317,
"protocol": 6,
"streamName": "meraki",
"clientIP": "105.107.1.36",
"serverIP": "135.229.164.250"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1673915368.754759350 M61_MX67C_Savannah flows src=105.107.1.36 dst=135.229.164.250 protocol=tcp sport=57317 dport=9207 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1673915368.754759350 M61_MX67C_Savannah flows src=105.107.1.36 dst=135.229.164.250 protocol=tcp sport=57317 dport=9207 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9207
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 57317
protocol: 6
streamName: meraki
clientIP: 105.107.1.36
serverIP: 135.229.164.250 | Explain this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.