input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<134>Original Address=75.146.93.165 1 1673915368.754759350 M61_MX67C_Savannah flows src=212.125.110.134 dst=117.40.201.250 protocol=tcp sport=57317 dport=9207 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 9207, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1673915368.754759350 M61_MX67C_Savannah flows src=212.125.110.134 dst=117.40.201.250 protocol=tcp sport=57317 dport=9207 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 57317, "protocol": 6, "streamName": "meraki", "clientIP": "212.125.110.134", "serverIP": "117.40.201.250" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1673915368.754759350 M61_MX67C_Savannah flows src=212.125.110.134 dst=117.40.201.250 protocol=tcp sport=57317 dport=9207 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1673915368.754759350 M61_MX67C_Savannah flows src=212.125.110.134 dst=117.40.201.250 protocol=tcp sport=57317 dport=9207 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 9207 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 57317 protocol: 6 streamName: meraki clientIP: 212.125.110.134 serverIP: 117.40.201.250
Explain this syslog message
<134>Original Address=75.146.93.165 1 1673915368.754759350 M61_MX67C_Savannah flows src=108.71.69.244 dst=35.74.183.191 protocol=tcp sport=57317 dport=9207 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 9207, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1673915368.754759350 M61_MX67C_Savannah flows src=108.71.69.244 dst=35.74.183.191 protocol=tcp sport=57317 dport=9207 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 57317, "protocol": 6, "streamName": "meraki", "clientIP": "108.71.69.244", "serverIP": "35.74.183.191" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1673915368.754759350 M61_MX67C_Savannah flows src=108.71.69.244 dst=35.74.183.191 protocol=tcp sport=57317 dport=9207 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1673915368.754759350 M61_MX67C_Savannah flows src=108.71.69.244 dst=35.74.183.191 protocol=tcp sport=57317 dport=9207 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 9207 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 57317 protocol: 6 streamName: meraki clientIP: 108.71.69.244 serverIP: 35.74.183.191
Explain this syslog message
<134>Original Address=96.73.220.25 1 1673915353.458438935 M38_MX67C_Conyers flows src=78.67.165.172 dst=77.166.127.123 protocol=tcp sport=59915 dport=8080 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 8080, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=96.73.220.25 1 1673915353.458438935 M38_MX67C_Conyers flows src=78.67.165.172 dst=77.166.127.123 protocol=tcp sport=59915 dport=8080 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 59915, "protocol": 6, "streamName": "meraki", "clientIP": "78.67.165.172", "serverIP": "77.166.127.123" }
Create a JSON artifact from the message
<134>Original Address=96.73.220.25 1 1673915353.458438935 M38_MX67C_Conyers flows src=78.67.165.172 dst=77.166.127.123 protocol=tcp sport=59915 dport=8080 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=96.73.220.25 1 1673915353.458438935 M38_MX67C_Conyers flows src=78.67.165.172 dst=77.166.127.123 protocol=tcp sport=59915 dport=8080 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 8080 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 59915 protocol: 6 streamName: meraki clientIP: 78.67.165.172 serverIP: 77.166.127.123
Explain this syslog message
<134>Original Address=96.73.220.25 1 1673915353.458438935 M38_MX67C_Conyers flows src=133.112.12.106 dst=183.181.14.220 protocol=tcp sport=59915 dport=8080 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 8080, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=96.73.220.25 1 1673915353.458438935 M38_MX67C_Conyers flows src=133.112.12.106 dst=183.181.14.220 protocol=tcp sport=59915 dport=8080 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 59915, "protocol": 6, "streamName": "meraki", "clientIP": "133.112.12.106", "serverIP": "183.181.14.220" }
Create a JSON artifact from the message
<134>Original Address=96.73.220.25 1 1673915353.458438935 M38_MX67C_Conyers flows src=133.112.12.106 dst=183.181.14.220 protocol=tcp sport=59915 dport=8080 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=96.73.220.25 1 1673915353.458438935 M38_MX67C_Conyers flows src=133.112.12.106 dst=183.181.14.220 protocol=tcp sport=59915 dport=8080 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 8080 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 59915 protocol: 6 streamName: meraki clientIP: 133.112.12.106 serverIP: 183.181.14.220
Explain this syslog message
<134>Original Address=96.73.220.25 1 1673915353.458438935 M38_MX67C_Conyers flows src=106.180.75.130 dst=132.207.165.202 protocol=tcp sport=59915 dport=8080 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 8080, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=96.73.220.25 1 1673915353.458438935 M38_MX67C_Conyers flows src=106.180.75.130 dst=132.207.165.202 protocol=tcp sport=59915 dport=8080 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 59915, "protocol": 6, "streamName": "meraki", "clientIP": "106.180.75.130", "serverIP": "132.207.165.202" }
Create a JSON artifact from the message
<134>Original Address=96.73.220.25 1 1673915353.458438935 M38_MX67C_Conyers flows src=106.180.75.130 dst=132.207.165.202 protocol=tcp sport=59915 dport=8080 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=96.73.220.25 1 1673915353.458438935 M38_MX67C_Conyers flows src=106.180.75.130 dst=132.207.165.202 protocol=tcp sport=59915 dport=8080 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 8080 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 59915 protocol: 6 streamName: meraki clientIP: 106.180.75.130 serverIP: 132.207.165.202
Explain this syslog message
<134>Original Address=96.73.220.25 1 1673915353.458438935 M38_MX67C_Conyers flows src=153.204.145.231 dst=24.130.40.83 protocol=tcp sport=59915 dport=8080 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 8080, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=96.73.220.25 1 1673915353.458438935 M38_MX67C_Conyers flows src=153.204.145.231 dst=24.130.40.83 protocol=tcp sport=59915 dport=8080 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 59915, "protocol": 6, "streamName": "meraki", "clientIP": "153.204.145.231", "serverIP": "24.130.40.83" }
Create a JSON artifact from the message
<134>Original Address=96.73.220.25 1 1673915353.458438935 M38_MX67C_Conyers flows src=153.204.145.231 dst=24.130.40.83 protocol=tcp sport=59915 dport=8080 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=96.73.220.25 1 1673915353.458438935 M38_MX67C_Conyers flows src=153.204.145.231 dst=24.130.40.83 protocol=tcp sport=59915 dport=8080 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 8080 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 59915 protocol: 6 streamName: meraki clientIP: 153.204.145.231 serverIP: 24.130.40.83
Explain this syslog message
<134>Original Address=35.135.130.90 1 1673915356.602287654 M49_MX67C_Montgomery flows src=187.234.217.244 dst=143.126.221.48 protocol=tcp sport=47660 dport=9207 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 9207, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=35.135.130.90 1 1673915356.602287654 M49_MX67C_Montgomery flows src=187.234.217.244 dst=143.126.221.48 protocol=tcp sport=47660 dport=9207 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 47660, "protocol": 6, "streamName": "meraki", "clientIP": "187.234.217.244", "serverIP": "143.126.221.48" }
Create a JSON artifact from the message
<134>Original Address=35.135.130.90 1 1673915356.602287654 M49_MX67C_Montgomery flows src=187.234.217.244 dst=143.126.221.48 protocol=tcp sport=47660 dport=9207 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=35.135.130.90 1 1673915356.602287654 M49_MX67C_Montgomery flows src=187.234.217.244 dst=143.126.221.48 protocol=tcp sport=47660 dport=9207 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 9207 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 47660 protocol: 6 streamName: meraki clientIP: 187.234.217.244 serverIP: 143.126.221.48
Explain this syslog message
<134>Original Address=35.135.130.90 1 1673915356.602287654 M49_MX67C_Montgomery flows src=34.175.161.173 dst=12.3.68.88 protocol=tcp sport=47660 dport=9207 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 9207, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=35.135.130.90 1 1673915356.602287654 M49_MX67C_Montgomery flows src=34.175.161.173 dst=12.3.68.88 protocol=tcp sport=47660 dport=9207 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 47660, "protocol": 6, "streamName": "meraki", "clientIP": "34.175.161.173", "serverIP": "12.3.68.88" }
Create a JSON artifact from the message
<134>Original Address=35.135.130.90 1 1673915356.602287654 M49_MX67C_Montgomery flows src=34.175.161.173 dst=12.3.68.88 protocol=tcp sport=47660 dport=9207 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=35.135.130.90 1 1673915356.602287654 M49_MX67C_Montgomery flows src=34.175.161.173 dst=12.3.68.88 protocol=tcp sport=47660 dport=9207 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 9207 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 47660 protocol: 6 streamName: meraki clientIP: 34.175.161.173 serverIP: 12.3.68.88
Explain this syslog message
<134>Original Address=35.135.130.90 1 1673915356.602287654 M49_MX67C_Montgomery flows src=56.107.174.204 dst=68.47.204.103 protocol=tcp sport=47660 dport=9207 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 9207, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=35.135.130.90 1 1673915356.602287654 M49_MX67C_Montgomery flows src=56.107.174.204 dst=68.47.204.103 protocol=tcp sport=47660 dport=9207 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 47660, "protocol": 6, "streamName": "meraki", "clientIP": "56.107.174.204", "serverIP": "68.47.204.103" }
Create a JSON artifact from the message
<134>Original Address=35.135.130.90 1 1673915356.602287654 M49_MX67C_Montgomery flows src=56.107.174.204 dst=68.47.204.103 protocol=tcp sport=47660 dport=9207 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=35.135.130.90 1 1673915356.602287654 M49_MX67C_Montgomery flows src=56.107.174.204 dst=68.47.204.103 protocol=tcp sport=47660 dport=9207 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 9207 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 47660 protocol: 6 streamName: meraki clientIP: 56.107.174.204 serverIP: 68.47.204.103
Explain this syslog message
<134>Original Address=35.135.130.90 1 1673915356.602287654 M49_MX67C_Montgomery flows src=75.120.100.165 dst=102.207.243.149 protocol=tcp sport=47660 dport=9207 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 9207, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=35.135.130.90 1 1673915356.602287654 M49_MX67C_Montgomery flows src=75.120.100.165 dst=102.207.243.149 protocol=tcp sport=47660 dport=9207 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 47660, "protocol": 6, "streamName": "meraki", "clientIP": "75.120.100.165", "serverIP": "102.207.243.149" }
Create a JSON artifact from the message
<134>Original Address=35.135.130.90 1 1673915356.602287654 M49_MX67C_Montgomery flows src=75.120.100.165 dst=102.207.243.149 protocol=tcp sport=47660 dport=9207 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=35.135.130.90 1 1673915356.602287654 M49_MX67C_Montgomery flows src=75.120.100.165 dst=102.207.243.149 protocol=tcp sport=47660 dport=9207 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 9207 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 47660 protocol: 6 streamName: meraki clientIP: 75.120.100.165 serverIP: 102.207.243.149
Explain this syslog message
<134>Original Address=96.82.21.145 1 1673915371.150590552 M82_MX67C_Huntsville flows src=226.199.218.118 dst=188.129.88.227 protocol=tcp sport=64176 dport=23 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 23, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=96.82.21.145 1 1673915371.150590552 M82_MX67C_Huntsville flows src=226.199.218.118 dst=188.129.88.227 protocol=tcp sport=64176 dport=23 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 64176, "protocol": 6, "streamName": "meraki", "clientIP": "226.199.218.118", "serverIP": "188.129.88.227" }
Create a JSON artifact from the message
<134>Original Address=96.82.21.145 1 1673915371.150590552 M82_MX67C_Huntsville flows src=226.199.218.118 dst=188.129.88.227 protocol=tcp sport=64176 dport=23 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=96.82.21.145 1 1673915371.150590552 M82_MX67C_Huntsville flows src=226.199.218.118 dst=188.129.88.227 protocol=tcp sport=64176 dport=23 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 23 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 64176 protocol: 6 streamName: meraki clientIP: 226.199.218.118 serverIP: 188.129.88.227
Explain this syslog message
<134>Original Address=96.82.21.145 1 1673915371.150590552 M82_MX67C_Huntsville flows src=213.26.98.15 dst=73.158.69.240 protocol=tcp sport=64176 dport=23 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 23, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=96.82.21.145 1 1673915371.150590552 M82_MX67C_Huntsville flows src=213.26.98.15 dst=73.158.69.240 protocol=tcp sport=64176 dport=23 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 64176, "protocol": 6, "streamName": "meraki", "clientIP": "213.26.98.15", "serverIP": "73.158.69.240" }
Create a JSON artifact from the message
<134>Original Address=96.82.21.145 1 1673915371.150590552 M82_MX67C_Huntsville flows src=213.26.98.15 dst=73.158.69.240 protocol=tcp sport=64176 dport=23 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=96.82.21.145 1 1673915371.150590552 M82_MX67C_Huntsville flows src=213.26.98.15 dst=73.158.69.240 protocol=tcp sport=64176 dport=23 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 23 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 64176 protocol: 6 streamName: meraki clientIP: 213.26.98.15 serverIP: 73.158.69.240
Explain this syslog message
<134>Original Address=96.82.21.145 1 1673915371.150590552 M82_MX67C_Huntsville flows src=209.100.184.33 dst=21.41.149.225 protocol=tcp sport=64176 dport=23 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 23, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=96.82.21.145 1 1673915371.150590552 M82_MX67C_Huntsville flows src=209.100.184.33 dst=21.41.149.225 protocol=tcp sport=64176 dport=23 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 64176, "protocol": 6, "streamName": "meraki", "clientIP": "209.100.184.33", "serverIP": "21.41.149.225" }
Create a JSON artifact from the message
<134>Original Address=96.82.21.145 1 1673915371.150590552 M82_MX67C_Huntsville flows src=209.100.184.33 dst=21.41.149.225 protocol=tcp sport=64176 dport=23 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=96.82.21.145 1 1673915371.150590552 M82_MX67C_Huntsville flows src=209.100.184.33 dst=21.41.149.225 protocol=tcp sport=64176 dport=23 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 23 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 64176 protocol: 6 streamName: meraki clientIP: 209.100.184.33 serverIP: 21.41.149.225
Explain this syslog message
<134>Original Address=96.82.21.145 1 1673915371.150590552 M82_MX67C_Huntsville flows src=104.231.228.140 dst=111.134.217.24 protocol=tcp sport=64176 dport=23 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 23, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=96.82.21.145 1 1673915371.150590552 M82_MX67C_Huntsville flows src=104.231.228.140 dst=111.134.217.24 protocol=tcp sport=64176 dport=23 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 64176, "protocol": 6, "streamName": "meraki", "clientIP": "104.231.228.140", "serverIP": "111.134.217.24" }
Create a JSON artifact from the message
<134>Original Address=96.82.21.145 1 1673915371.150590552 M82_MX67C_Huntsville flows src=104.231.228.140 dst=111.134.217.24 protocol=tcp sport=64176 dport=23 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=96.82.21.145 1 1673915371.150590552 M82_MX67C_Huntsville flows src=104.231.228.140 dst=111.134.217.24 protocol=tcp sport=64176 dport=23 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 23 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 64176 protocol: 6 streamName: meraki clientIP: 104.231.228.140 serverIP: 111.134.217.24
Explain this syslog message
<134>Original Address=75.146.93.165 1 1673915364.143019630 M61_MX67C_Savannah flows src=212.242.255.185 dst=43.201.106.214 protocol=tcp sport=60693 dport=9207 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 9207, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1673915364.143019630 M61_MX67C_Savannah flows src=212.242.255.185 dst=43.201.106.214 protocol=tcp sport=60693 dport=9207 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 60693, "protocol": 6, "streamName": "meraki", "clientIP": "212.242.255.185", "serverIP": "43.201.106.214" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1673915364.143019630 M61_MX67C_Savannah flows src=212.242.255.185 dst=43.201.106.214 protocol=tcp sport=60693 dport=9207 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1673915364.143019630 M61_MX67C_Savannah flows src=212.242.255.185 dst=43.201.106.214 protocol=tcp sport=60693 dport=9207 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 9207 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 60693 protocol: 6 streamName: meraki clientIP: 212.242.255.185 serverIP: 43.201.106.214
Explain this syslog message
<134>Original Address=75.146.93.165 1 1673915364.143019630 M61_MX67C_Savannah flows src=27.253.216.80 dst=82.108.150.85 protocol=tcp sport=60693 dport=9207 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 9207, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1673915364.143019630 M61_MX67C_Savannah flows src=27.253.216.80 dst=82.108.150.85 protocol=tcp sport=60693 dport=9207 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 60693, "protocol": 6, "streamName": "meraki", "clientIP": "27.253.216.80", "serverIP": "82.108.150.85" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1673915364.143019630 M61_MX67C_Savannah flows src=27.253.216.80 dst=82.108.150.85 protocol=tcp sport=60693 dport=9207 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1673915364.143019630 M61_MX67C_Savannah flows src=27.253.216.80 dst=82.108.150.85 protocol=tcp sport=60693 dport=9207 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 9207 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 60693 protocol: 6 streamName: meraki clientIP: 27.253.216.80 serverIP: 82.108.150.85
Explain this syslog message
<134>Original Address=75.146.93.165 1 1673915364.868465310 M61_MX67C_Savannah flows src=131.163.74.150 dst=191.184.35.228 protocol=tcp sport=40140 dport=9214 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 9214, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1673915364.868465310 M61_MX67C_Savannah flows src=131.163.74.150 dst=191.184.35.228 protocol=tcp sport=40140 dport=9214 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 40140, "protocol": 6, "streamName": "meraki", "clientIP": "131.163.74.150", "serverIP": "191.184.35.228" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1673915364.868465310 M61_MX67C_Savannah flows src=131.163.74.150 dst=191.184.35.228 protocol=tcp sport=40140 dport=9214 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1673915364.868465310 M61_MX67C_Savannah flows src=131.163.74.150 dst=191.184.35.228 protocol=tcp sport=40140 dport=9214 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 9214 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 40140 protocol: 6 streamName: meraki clientIP: 131.163.74.150 serverIP: 191.184.35.228
Explain this syslog message
<134>Original Address=75.146.93.165 1 1673915364.868465310 M61_MX67C_Savannah flows src=174.245.44.38 dst=110.78.90.7 protocol=tcp sport=40140 dport=9214 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 9214, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1673915364.868465310 M61_MX67C_Savannah flows src=174.245.44.38 dst=110.78.90.7 protocol=tcp sport=40140 dport=9214 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 40140, "protocol": 6, "streamName": "meraki", "clientIP": "174.245.44.38", "serverIP": "110.78.90.7" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1673915364.868465310 M61_MX67C_Savannah flows src=174.245.44.38 dst=110.78.90.7 protocol=tcp sport=40140 dport=9214 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1673915364.868465310 M61_MX67C_Savannah flows src=174.245.44.38 dst=110.78.90.7 protocol=tcp sport=40140 dport=9214 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 9214 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 40140 protocol: 6 streamName: meraki clientIP: 174.245.44.38 serverIP: 110.78.90.7
Explain this syslog message
<134>Original Address=75.146.93.165 1 1673915364.143019630 M61_MX67C_Savannah flows src=146.22.204.142 dst=94.42.223.207 protocol=tcp sport=60693 dport=9207 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 9207, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1673915364.143019630 M61_MX67C_Savannah flows src=146.22.204.142 dst=94.42.223.207 protocol=tcp sport=60693 dport=9207 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 60693, "protocol": 6, "streamName": "meraki", "clientIP": "146.22.204.142", "serverIP": "94.42.223.207" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1673915364.143019630 M61_MX67C_Savannah flows src=146.22.204.142 dst=94.42.223.207 protocol=tcp sport=60693 dport=9207 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1673915364.143019630 M61_MX67C_Savannah flows src=146.22.204.142 dst=94.42.223.207 protocol=tcp sport=60693 dport=9207 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 9207 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 60693 protocol: 6 streamName: meraki clientIP: 146.22.204.142 serverIP: 94.42.223.207
Explain this syslog message
<134>Original Address=75.146.93.165 1 1673915364.143019630 M61_MX67C_Savannah flows src=230.8.34.97 dst=53.168.147.232 protocol=tcp sport=60693 dport=9207 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 9207, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1673915364.143019630 M61_MX67C_Savannah flows src=230.8.34.97 dst=53.168.147.232 protocol=tcp sport=60693 dport=9207 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 60693, "protocol": 6, "streamName": "meraki", "clientIP": "230.8.34.97", "serverIP": "53.168.147.232" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1673915364.143019630 M61_MX67C_Savannah flows src=230.8.34.97 dst=53.168.147.232 protocol=tcp sport=60693 dport=9207 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1673915364.143019630 M61_MX67C_Savannah flows src=230.8.34.97 dst=53.168.147.232 protocol=tcp sport=60693 dport=9207 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 9207 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 60693 protocol: 6 streamName: meraki clientIP: 230.8.34.97 serverIP: 53.168.147.232
Explain this syslog message
<134>Original Address=75.146.93.165 1 1673915364.868465310 M61_MX67C_Savannah flows src=6.216.235.210 dst=218.231.128.114 protocol=tcp sport=40140 dport=9214 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 9214, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1673915364.868465310 M61_MX67C_Savannah flows src=6.216.235.210 dst=218.231.128.114 protocol=tcp sport=40140 dport=9214 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 40140, "protocol": 6, "streamName": "meraki", "clientIP": "6.216.235.210", "serverIP": "218.231.128.114" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1673915364.868465310 M61_MX67C_Savannah flows src=6.216.235.210 dst=218.231.128.114 protocol=tcp sport=40140 dport=9214 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1673915364.868465310 M61_MX67C_Savannah flows src=6.216.235.210 dst=218.231.128.114 protocol=tcp sport=40140 dport=9214 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 9214 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 40140 protocol: 6 streamName: meraki clientIP: 6.216.235.210 serverIP: 218.231.128.114
Explain this syslog message
<134>Original Address=75.146.93.165 1 1673915364.868465310 M61_MX67C_Savannah flows src=28.22.83.220 dst=186.7.45.41 protocol=tcp sport=40140 dport=9214 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 9214, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1673915364.868465310 M61_MX67C_Savannah flows src=28.22.83.220 dst=186.7.45.41 protocol=tcp sport=40140 dport=9214 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 40140, "protocol": 6, "streamName": "meraki", "clientIP": "28.22.83.220", "serverIP": "186.7.45.41" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1673915364.868465310 M61_MX67C_Savannah flows src=28.22.83.220 dst=186.7.45.41 protocol=tcp sport=40140 dport=9214 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1673915364.868465310 M61_MX67C_Savannah flows src=28.22.83.220 dst=186.7.45.41 protocol=tcp sport=40140 dport=9214 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 9214 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 40140 protocol: 6 streamName: meraki clientIP: 28.22.83.220 serverIP: 186.7.45.41
Explain this syslog message
<134>Original Address=10.11.22.1 1 1673915357.461849784 M22_MX67C_Marietta flows src=32.15.226.30 dst=148.2.99.56 protocol=tcp sport=56388 dport=9214 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 9214, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=10.11.22.1 1 1673915357.461849784 M22_MX67C_Marietta flows src=32.15.226.30 dst=148.2.99.56 protocol=tcp sport=56388 dport=9214 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 56388, "protocol": 6, "streamName": "meraki", "clientIP": "32.15.226.30", "serverIP": "148.2.99.56" }
Create a JSON artifact from the message
<134>Original Address=10.11.22.1 1 1673915357.461849784 M22_MX67C_Marietta flows src=32.15.226.30 dst=148.2.99.56 protocol=tcp sport=56388 dport=9214 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=10.11.22.1 1 1673915357.461849784 M22_MX67C_Marietta flows src=32.15.226.30 dst=148.2.99.56 protocol=tcp sport=56388 dport=9214 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 9214 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 56388 protocol: 6 streamName: meraki clientIP: 32.15.226.30 serverIP: 148.2.99.56
Explain this syslog message
<134>Original Address=10.11.22.1 1 1673915357.461849784 M22_MX67C_Marietta flows src=201.142.120.166 dst=195.85.15.196 protocol=tcp sport=56388 dport=9214 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 9214, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=10.11.22.1 1 1673915357.461849784 M22_MX67C_Marietta flows src=201.142.120.166 dst=195.85.15.196 protocol=tcp sport=56388 dport=9214 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 56388, "protocol": 6, "streamName": "meraki", "clientIP": "201.142.120.166", "serverIP": "195.85.15.196" }
Create a JSON artifact from the message
<134>Original Address=10.11.22.1 1 1673915357.461849784 M22_MX67C_Marietta flows src=201.142.120.166 dst=195.85.15.196 protocol=tcp sport=56388 dport=9214 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=10.11.22.1 1 1673915357.461849784 M22_MX67C_Marietta flows src=201.142.120.166 dst=195.85.15.196 protocol=tcp sport=56388 dport=9214 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 9214 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 56388 protocol: 6 streamName: meraki clientIP: 201.142.120.166 serverIP: 195.85.15.196
Explain this syslog message
<134>Original Address=10.11.22.1 1 1673915357.461849784 M22_MX67C_Marietta flows src=193.138.144.242 dst=28.219.236.252 protocol=tcp sport=56388 dport=9214 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 9214, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=10.11.22.1 1 1673915357.461849784 M22_MX67C_Marietta flows src=193.138.144.242 dst=28.219.236.252 protocol=tcp sport=56388 dport=9214 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 56388, "protocol": 6, "streamName": "meraki", "clientIP": "193.138.144.242", "serverIP": "28.219.236.252" }
Create a JSON artifact from the message
<134>Original Address=10.11.22.1 1 1673915357.461849784 M22_MX67C_Marietta flows src=193.138.144.242 dst=28.219.236.252 protocol=tcp sport=56388 dport=9214 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=10.11.22.1 1 1673915357.461849784 M22_MX67C_Marietta flows src=193.138.144.242 dst=28.219.236.252 protocol=tcp sport=56388 dport=9214 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 9214 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 56388 protocol: 6 streamName: meraki clientIP: 193.138.144.242 serverIP: 28.219.236.252
Explain this syslog message
<134>Original Address=10.11.22.1 1 1673915357.461849784 M22_MX67C_Marietta flows src=25.18.68.199 dst=66.37.168.210 protocol=tcp sport=56388 dport=9214 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 9214, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=10.11.22.1 1 1673915357.461849784 M22_MX67C_Marietta flows src=25.18.68.199 dst=66.37.168.210 protocol=tcp sport=56388 dport=9214 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 56388, "protocol": 6, "streamName": "meraki", "clientIP": "25.18.68.199", "serverIP": "66.37.168.210" }
Create a JSON artifact from the message
<134>Original Address=10.11.22.1 1 1673915357.461849784 M22_MX67C_Marietta flows src=25.18.68.199 dst=66.37.168.210 protocol=tcp sport=56388 dport=9214 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=10.11.22.1 1 1673915357.461849784 M22_MX67C_Marietta flows src=25.18.68.199 dst=66.37.168.210 protocol=tcp sport=56388 dport=9214 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 9214 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 56388 protocol: 6 streamName: meraki clientIP: 25.18.68.199 serverIP: 66.37.168.210
Explain this syslog message
<134>Original Address=143.194.202.212 1 1673915366.882753904 M162_MX67C_SavCCG flows src=46.207.89.7 dst=143.194.202.212 protocol=tcp sport=56483 dport=5016 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5016, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=143.194.202.212 1 1673915366.882753904 M162_MX67C_SavCCG flows src=46.207.89.7 dst=143.194.202.212 protocol=tcp sport=56483 dport=5016 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 56483, "protocol": 6, "streamName": "meraki", "clientIP": "46.207.89.7", "serverIP": "143.194.202.212" }
Create a JSON artifact from the message
<134>Original Address=143.194.202.212 1 1673915366.882753904 M162_MX67C_SavCCG flows src=46.207.89.7 dst=143.194.202.212 protocol=tcp sport=56483 dport=5016 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=143.194.202.212 1 1673915366.882753904 M162_MX67C_SavCCG flows src=46.207.89.7 dst=143.194.202.212 protocol=tcp sport=56483 dport=5016 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5016 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 56483 protocol: 6 streamName: meraki clientIP: 46.207.89.7 serverIP: 143.194.202.212
Explain this syslog message
<134>Original Address=93.78.208.83 1 1673915366.882753904 M162_MX67C_SavCCG flows src=45.124.3.53 dst=93.78.208.83 protocol=tcp sport=56483 dport=5016 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5016, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=93.78.208.83 1 1673915366.882753904 M162_MX67C_SavCCG flows src=45.124.3.53 dst=93.78.208.83 protocol=tcp sport=56483 dport=5016 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 56483, "protocol": 6, "streamName": "meraki", "clientIP": "45.124.3.53", "serverIP": "93.78.208.83" }
Create a JSON artifact from the message
<134>Original Address=93.78.208.83 1 1673915366.882753904 M162_MX67C_SavCCG flows src=45.124.3.53 dst=93.78.208.83 protocol=tcp sport=56483 dport=5016 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=93.78.208.83 1 1673915366.882753904 M162_MX67C_SavCCG flows src=45.124.3.53 dst=93.78.208.83 protocol=tcp sport=56483 dport=5016 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5016 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 56483 protocol: 6 streamName: meraki clientIP: 45.124.3.53 serverIP: 93.78.208.83
Explain this syslog message
<134>Original Address=244.238.166.72 1 1673915366.882753904 M162_MX67C_SavCCG flows src=212.251.219.53 dst=244.238.166.72 protocol=tcp sport=56483 dport=5016 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5016, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=244.238.166.72 1 1673915366.882753904 M162_MX67C_SavCCG flows src=212.251.219.53 dst=244.238.166.72 protocol=tcp sport=56483 dport=5016 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 56483, "protocol": 6, "streamName": "meraki", "clientIP": "212.251.219.53", "serverIP": "244.238.166.72" }
Create a JSON artifact from the message
<134>Original Address=244.238.166.72 1 1673915366.882753904 M162_MX67C_SavCCG flows src=212.251.219.53 dst=244.238.166.72 protocol=tcp sport=56483 dport=5016 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=244.238.166.72 1 1673915366.882753904 M162_MX67C_SavCCG flows src=212.251.219.53 dst=244.238.166.72 protocol=tcp sport=56483 dport=5016 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5016 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 56483 protocol: 6 streamName: meraki clientIP: 212.251.219.53 serverIP: 244.238.166.72
Explain this syslog message
<134>Original Address=41.219.28.220 1 1673915366.882753904 M162_MX67C_SavCCG flows src=47.80.30.88 dst=41.219.28.220 protocol=tcp sport=56483 dport=5016 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 5016, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=41.219.28.220 1 1673915366.882753904 M162_MX67C_SavCCG flows src=47.80.30.88 dst=41.219.28.220 protocol=tcp sport=56483 dport=5016 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 56483, "protocol": 6, "streamName": "meraki", "clientIP": "47.80.30.88", "serverIP": "41.219.28.220" }
Create a JSON artifact from the message
<134>Original Address=41.219.28.220 1 1673915366.882753904 M162_MX67C_SavCCG flows src=47.80.30.88 dst=41.219.28.220 protocol=tcp sport=56483 dport=5016 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=41.219.28.220 1 1673915366.882753904 M162_MX67C_SavCCG flows src=47.80.30.88 dst=41.219.28.220 protocol=tcp sport=56483 dport=5016 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 5016 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 56483 protocol: 6 streamName: meraki clientIP: 47.80.30.88 serverIP: 41.219.28.220
Explain this syslog message
<134>Original Address=64.139.91.93 1 1673915369.420001659 M64_MX67C_Augusta flows src=198.252.218.180 dst=240.118.109.77 protocol=tcp sport=12960 dport=54631 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 12960, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=64.139.91.93 1 1673915369.420001659 M64_MX67C_Augusta flows src=198.252.218.180 dst=240.118.109.77 protocol=tcp sport=12960 dport=54631 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 54631, "protocol": 6, "streamName": "meraki", "clientIP": "240.118.109.77", "serverIP": "198.252.218.180" }
Create a JSON artifact from the message
<134>Original Address=64.139.91.93 1 1673915369.420001659 M64_MX67C_Augusta flows src=198.252.218.180 dst=240.118.109.77 protocol=tcp sport=12960 dport=54631 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=64.139.91.93 1 1673915369.420001659 M64_MX67C_Augusta flows src=198.252.218.180 dst=240.118.109.77 protocol=tcp sport=12960 dport=54631 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 12960 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 54631 protocol: 6 streamName: meraki clientIP: 240.118.109.77 serverIP: 198.252.218.180
Explain this syslog message
<134>Original Address=64.139.91.93 1 1673915369.420001659 M64_MX67C_Augusta flows src=0.102.173.19 dst=95.40.97.143 protocol=tcp sport=12960 dport=54631 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 12960, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=64.139.91.93 1 1673915369.420001659 M64_MX67C_Augusta flows src=0.102.173.19 dst=95.40.97.143 protocol=tcp sport=12960 dport=54631 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 54631, "protocol": 6, "streamName": "meraki", "clientIP": "95.40.97.143", "serverIP": "0.102.173.19" }
Create a JSON artifact from the message
<134>Original Address=64.139.91.93 1 1673915369.420001659 M64_MX67C_Augusta flows src=0.102.173.19 dst=95.40.97.143 protocol=tcp sport=12960 dport=54631 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=64.139.91.93 1 1673915369.420001659 M64_MX67C_Augusta flows src=0.102.173.19 dst=95.40.97.143 protocol=tcp sport=12960 dport=54631 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 12960 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 54631 protocol: 6 streamName: meraki clientIP: 95.40.97.143 serverIP: 0.102.173.19
Explain this syslog message
<134>Original Address=64.139.91.93 1 1673915369.420001659 M64_MX67C_Augusta flows src=185.184.193.152 dst=54.127.45.98 protocol=tcp sport=12960 dport=54631 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 12960, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=64.139.91.93 1 1673915369.420001659 M64_MX67C_Augusta flows src=185.184.193.152 dst=54.127.45.98 protocol=tcp sport=12960 dport=54631 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 54631, "protocol": 6, "streamName": "meraki", "clientIP": "54.127.45.98", "serverIP": "185.184.193.152" }
Create a JSON artifact from the message
<134>Original Address=64.139.91.93 1 1673915369.420001659 M64_MX67C_Augusta flows src=185.184.193.152 dst=54.127.45.98 protocol=tcp sport=12960 dport=54631 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=64.139.91.93 1 1673915369.420001659 M64_MX67C_Augusta flows src=185.184.193.152 dst=54.127.45.98 protocol=tcp sport=12960 dport=54631 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 12960 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 54631 protocol: 6 streamName: meraki clientIP: 54.127.45.98 serverIP: 185.184.193.152
Explain this syslog message
<134>Original Address=64.139.91.93 1 1673915369.420001659 M64_MX67C_Augusta flows src=73.133.18.6 dst=205.125.244.170 protocol=tcp sport=12960 dport=54631 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 12960, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=64.139.91.93 1 1673915369.420001659 M64_MX67C_Augusta flows src=73.133.18.6 dst=205.125.244.170 protocol=tcp sport=12960 dport=54631 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 54631, "protocol": 6, "streamName": "meraki", "clientIP": "205.125.244.170", "serverIP": "73.133.18.6" }
Create a JSON artifact from the message