input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<134>Original Address=75.146.93.165 1 1673915368.754759350 M61_MX67C_Savannah flows src=212.125.110.134 dst=117.40.201.250 protocol=tcp sport=57317 dport=9207 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9207,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1673915368.754759350 M61_MX67C_Savannah flows src=212.125.110.134 dst=117.40.201.250 protocol=tcp sport=57317 dport=9207 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 57317,
"protocol": 6,
"streamName": "meraki",
"clientIP": "212.125.110.134",
"serverIP": "117.40.201.250"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1673915368.754759350 M61_MX67C_Savannah flows src=212.125.110.134 dst=117.40.201.250 protocol=tcp sport=57317 dport=9207 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1673915368.754759350 M61_MX67C_Savannah flows src=212.125.110.134 dst=117.40.201.250 protocol=tcp sport=57317 dport=9207 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9207
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 57317
protocol: 6
streamName: meraki
clientIP: 212.125.110.134
serverIP: 117.40.201.250 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1673915368.754759350 M61_MX67C_Savannah flows src=108.71.69.244 dst=35.74.183.191 protocol=tcp sport=57317 dport=9207 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9207,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1673915368.754759350 M61_MX67C_Savannah flows src=108.71.69.244 dst=35.74.183.191 protocol=tcp sport=57317 dport=9207 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 57317,
"protocol": 6,
"streamName": "meraki",
"clientIP": "108.71.69.244",
"serverIP": "35.74.183.191"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1673915368.754759350 M61_MX67C_Savannah flows src=108.71.69.244 dst=35.74.183.191 protocol=tcp sport=57317 dport=9207 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1673915368.754759350 M61_MX67C_Savannah flows src=108.71.69.244 dst=35.74.183.191 protocol=tcp sport=57317 dport=9207 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9207
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 57317
protocol: 6
streamName: meraki
clientIP: 108.71.69.244
serverIP: 35.74.183.191 | Explain this syslog message |
<134>Original Address=96.73.220.25 1 1673915353.458438935 M38_MX67C_Conyers flows src=78.67.165.172 dst=77.166.127.123 protocol=tcp sport=59915 dport=8080 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 8080,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.220.25 1 1673915353.458438935 M38_MX67C_Conyers flows src=78.67.165.172 dst=77.166.127.123 protocol=tcp sport=59915 dport=8080 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 59915,
"protocol": 6,
"streamName": "meraki",
"clientIP": "78.67.165.172",
"serverIP": "77.166.127.123"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.220.25 1 1673915353.458438935 M38_MX67C_Conyers flows src=78.67.165.172 dst=77.166.127.123 protocol=tcp sport=59915 dport=8080 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.220.25 1 1673915353.458438935 M38_MX67C_Conyers flows src=78.67.165.172 dst=77.166.127.123 protocol=tcp sport=59915 dport=8080 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 8080
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 59915
protocol: 6
streamName: meraki
clientIP: 78.67.165.172
serverIP: 77.166.127.123 | Explain this syslog message |
<134>Original Address=96.73.220.25 1 1673915353.458438935 M38_MX67C_Conyers flows src=133.112.12.106 dst=183.181.14.220 protocol=tcp sport=59915 dport=8080 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 8080,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.220.25 1 1673915353.458438935 M38_MX67C_Conyers flows src=133.112.12.106 dst=183.181.14.220 protocol=tcp sport=59915 dport=8080 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 59915,
"protocol": 6,
"streamName": "meraki",
"clientIP": "133.112.12.106",
"serverIP": "183.181.14.220"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.220.25 1 1673915353.458438935 M38_MX67C_Conyers flows src=133.112.12.106 dst=183.181.14.220 protocol=tcp sport=59915 dport=8080 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.220.25 1 1673915353.458438935 M38_MX67C_Conyers flows src=133.112.12.106 dst=183.181.14.220 protocol=tcp sport=59915 dport=8080 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 8080
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 59915
protocol: 6
streamName: meraki
clientIP: 133.112.12.106
serverIP: 183.181.14.220 | Explain this syslog message |
<134>Original Address=96.73.220.25 1 1673915353.458438935 M38_MX67C_Conyers flows src=106.180.75.130 dst=132.207.165.202 protocol=tcp sport=59915 dport=8080 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 8080,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.220.25 1 1673915353.458438935 M38_MX67C_Conyers flows src=106.180.75.130 dst=132.207.165.202 protocol=tcp sport=59915 dport=8080 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 59915,
"protocol": 6,
"streamName": "meraki",
"clientIP": "106.180.75.130",
"serverIP": "132.207.165.202"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.220.25 1 1673915353.458438935 M38_MX67C_Conyers flows src=106.180.75.130 dst=132.207.165.202 protocol=tcp sport=59915 dport=8080 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.220.25 1 1673915353.458438935 M38_MX67C_Conyers flows src=106.180.75.130 dst=132.207.165.202 protocol=tcp sport=59915 dport=8080 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 8080
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 59915
protocol: 6
streamName: meraki
clientIP: 106.180.75.130
serverIP: 132.207.165.202 | Explain this syslog message |
<134>Original Address=96.73.220.25 1 1673915353.458438935 M38_MX67C_Conyers flows src=153.204.145.231 dst=24.130.40.83 protocol=tcp sport=59915 dport=8080 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 8080,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.220.25 1 1673915353.458438935 M38_MX67C_Conyers flows src=153.204.145.231 dst=24.130.40.83 protocol=tcp sport=59915 dport=8080 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 59915,
"protocol": 6,
"streamName": "meraki",
"clientIP": "153.204.145.231",
"serverIP": "24.130.40.83"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.220.25 1 1673915353.458438935 M38_MX67C_Conyers flows src=153.204.145.231 dst=24.130.40.83 protocol=tcp sport=59915 dport=8080 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.220.25 1 1673915353.458438935 M38_MX67C_Conyers flows src=153.204.145.231 dst=24.130.40.83 protocol=tcp sport=59915 dport=8080 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 8080
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 59915
protocol: 6
streamName: meraki
clientIP: 153.204.145.231
serverIP: 24.130.40.83 | Explain this syslog message |
<134>Original Address=35.135.130.90 1 1673915356.602287654 M49_MX67C_Montgomery flows src=187.234.217.244 dst=143.126.221.48 protocol=tcp sport=47660 dport=9207 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9207,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=35.135.130.90 1 1673915356.602287654 M49_MX67C_Montgomery flows src=187.234.217.244 dst=143.126.221.48 protocol=tcp sport=47660 dport=9207 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 47660,
"protocol": 6,
"streamName": "meraki",
"clientIP": "187.234.217.244",
"serverIP": "143.126.221.48"
} | Create a JSON artifact from the message |
<134>Original Address=35.135.130.90 1 1673915356.602287654 M49_MX67C_Montgomery flows src=187.234.217.244 dst=143.126.221.48 protocol=tcp sport=47660 dport=9207 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=35.135.130.90 1 1673915356.602287654 M49_MX67C_Montgomery flows src=187.234.217.244 dst=143.126.221.48 protocol=tcp sport=47660 dport=9207 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9207
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 47660
protocol: 6
streamName: meraki
clientIP: 187.234.217.244
serverIP: 143.126.221.48 | Explain this syslog message |
<134>Original Address=35.135.130.90 1 1673915356.602287654 M49_MX67C_Montgomery flows src=34.175.161.173 dst=12.3.68.88 protocol=tcp sport=47660 dport=9207 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9207,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=35.135.130.90 1 1673915356.602287654 M49_MX67C_Montgomery flows src=34.175.161.173 dst=12.3.68.88 protocol=tcp sport=47660 dport=9207 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 47660,
"protocol": 6,
"streamName": "meraki",
"clientIP": "34.175.161.173",
"serverIP": "12.3.68.88"
} | Create a JSON artifact from the message |
<134>Original Address=35.135.130.90 1 1673915356.602287654 M49_MX67C_Montgomery flows src=34.175.161.173 dst=12.3.68.88 protocol=tcp sport=47660 dport=9207 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=35.135.130.90 1 1673915356.602287654 M49_MX67C_Montgomery flows src=34.175.161.173 dst=12.3.68.88 protocol=tcp sport=47660 dport=9207 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9207
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 47660
protocol: 6
streamName: meraki
clientIP: 34.175.161.173
serverIP: 12.3.68.88 | Explain this syslog message |
<134>Original Address=35.135.130.90 1 1673915356.602287654 M49_MX67C_Montgomery flows src=56.107.174.204 dst=68.47.204.103 protocol=tcp sport=47660 dport=9207 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9207,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=35.135.130.90 1 1673915356.602287654 M49_MX67C_Montgomery flows src=56.107.174.204 dst=68.47.204.103 protocol=tcp sport=47660 dport=9207 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 47660,
"protocol": 6,
"streamName": "meraki",
"clientIP": "56.107.174.204",
"serverIP": "68.47.204.103"
} | Create a JSON artifact from the message |
<134>Original Address=35.135.130.90 1 1673915356.602287654 M49_MX67C_Montgomery flows src=56.107.174.204 dst=68.47.204.103 protocol=tcp sport=47660 dport=9207 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=35.135.130.90 1 1673915356.602287654 M49_MX67C_Montgomery flows src=56.107.174.204 dst=68.47.204.103 protocol=tcp sport=47660 dport=9207 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9207
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 47660
protocol: 6
streamName: meraki
clientIP: 56.107.174.204
serverIP: 68.47.204.103 | Explain this syslog message |
<134>Original Address=35.135.130.90 1 1673915356.602287654 M49_MX67C_Montgomery flows src=75.120.100.165 dst=102.207.243.149 protocol=tcp sport=47660 dport=9207 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9207,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=35.135.130.90 1 1673915356.602287654 M49_MX67C_Montgomery flows src=75.120.100.165 dst=102.207.243.149 protocol=tcp sport=47660 dport=9207 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 47660,
"protocol": 6,
"streamName": "meraki",
"clientIP": "75.120.100.165",
"serverIP": "102.207.243.149"
} | Create a JSON artifact from the message |
<134>Original Address=35.135.130.90 1 1673915356.602287654 M49_MX67C_Montgomery flows src=75.120.100.165 dst=102.207.243.149 protocol=tcp sport=47660 dport=9207 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=35.135.130.90 1 1673915356.602287654 M49_MX67C_Montgomery flows src=75.120.100.165 dst=102.207.243.149 protocol=tcp sport=47660 dport=9207 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9207
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 47660
protocol: 6
streamName: meraki
clientIP: 75.120.100.165
serverIP: 102.207.243.149 | Explain this syslog message |
<134>Original Address=96.82.21.145 1 1673915371.150590552 M82_MX67C_Huntsville flows src=226.199.218.118 dst=188.129.88.227 protocol=tcp sport=64176 dport=23 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 23,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.82.21.145 1 1673915371.150590552 M82_MX67C_Huntsville flows src=226.199.218.118 dst=188.129.88.227 protocol=tcp sport=64176 dport=23 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 64176,
"protocol": 6,
"streamName": "meraki",
"clientIP": "226.199.218.118",
"serverIP": "188.129.88.227"
} | Create a JSON artifact from the message |
<134>Original Address=96.82.21.145 1 1673915371.150590552 M82_MX67C_Huntsville flows src=226.199.218.118 dst=188.129.88.227 protocol=tcp sport=64176 dport=23 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.82.21.145 1 1673915371.150590552 M82_MX67C_Huntsville flows src=226.199.218.118 dst=188.129.88.227 protocol=tcp sport=64176 dport=23 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 23
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 64176
protocol: 6
streamName: meraki
clientIP: 226.199.218.118
serverIP: 188.129.88.227 | Explain this syslog message |
<134>Original Address=96.82.21.145 1 1673915371.150590552 M82_MX67C_Huntsville flows src=213.26.98.15 dst=73.158.69.240 protocol=tcp sport=64176 dport=23 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 23,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.82.21.145 1 1673915371.150590552 M82_MX67C_Huntsville flows src=213.26.98.15 dst=73.158.69.240 protocol=tcp sport=64176 dport=23 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 64176,
"protocol": 6,
"streamName": "meraki",
"clientIP": "213.26.98.15",
"serverIP": "73.158.69.240"
} | Create a JSON artifact from the message |
<134>Original Address=96.82.21.145 1 1673915371.150590552 M82_MX67C_Huntsville flows src=213.26.98.15 dst=73.158.69.240 protocol=tcp sport=64176 dport=23 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.82.21.145 1 1673915371.150590552 M82_MX67C_Huntsville flows src=213.26.98.15 dst=73.158.69.240 protocol=tcp sport=64176 dport=23 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 23
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 64176
protocol: 6
streamName: meraki
clientIP: 213.26.98.15
serverIP: 73.158.69.240 | Explain this syslog message |
<134>Original Address=96.82.21.145 1 1673915371.150590552 M82_MX67C_Huntsville flows src=209.100.184.33 dst=21.41.149.225 protocol=tcp sport=64176 dport=23 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 23,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.82.21.145 1 1673915371.150590552 M82_MX67C_Huntsville flows src=209.100.184.33 dst=21.41.149.225 protocol=tcp sport=64176 dport=23 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 64176,
"protocol": 6,
"streamName": "meraki",
"clientIP": "209.100.184.33",
"serverIP": "21.41.149.225"
} | Create a JSON artifact from the message |
<134>Original Address=96.82.21.145 1 1673915371.150590552 M82_MX67C_Huntsville flows src=209.100.184.33 dst=21.41.149.225 protocol=tcp sport=64176 dport=23 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.82.21.145 1 1673915371.150590552 M82_MX67C_Huntsville flows src=209.100.184.33 dst=21.41.149.225 protocol=tcp sport=64176 dport=23 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 23
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 64176
protocol: 6
streamName: meraki
clientIP: 209.100.184.33
serverIP: 21.41.149.225 | Explain this syslog message |
<134>Original Address=96.82.21.145 1 1673915371.150590552 M82_MX67C_Huntsville flows src=104.231.228.140 dst=111.134.217.24 protocol=tcp sport=64176 dport=23 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 23,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.82.21.145 1 1673915371.150590552 M82_MX67C_Huntsville flows src=104.231.228.140 dst=111.134.217.24 protocol=tcp sport=64176 dport=23 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 64176,
"protocol": 6,
"streamName": "meraki",
"clientIP": "104.231.228.140",
"serverIP": "111.134.217.24"
} | Create a JSON artifact from the message |
<134>Original Address=96.82.21.145 1 1673915371.150590552 M82_MX67C_Huntsville flows src=104.231.228.140 dst=111.134.217.24 protocol=tcp sport=64176 dport=23 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.82.21.145 1 1673915371.150590552 M82_MX67C_Huntsville flows src=104.231.228.140 dst=111.134.217.24 protocol=tcp sport=64176 dport=23 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 23
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 64176
protocol: 6
streamName: meraki
clientIP: 104.231.228.140
serverIP: 111.134.217.24 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1673915364.143019630 M61_MX67C_Savannah flows src=212.242.255.185 dst=43.201.106.214 protocol=tcp sport=60693 dport=9207 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9207,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1673915364.143019630 M61_MX67C_Savannah flows src=212.242.255.185 dst=43.201.106.214 protocol=tcp sport=60693 dport=9207 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 60693,
"protocol": 6,
"streamName": "meraki",
"clientIP": "212.242.255.185",
"serverIP": "43.201.106.214"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1673915364.143019630 M61_MX67C_Savannah flows src=212.242.255.185 dst=43.201.106.214 protocol=tcp sport=60693 dport=9207 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1673915364.143019630 M61_MX67C_Savannah flows src=212.242.255.185 dst=43.201.106.214 protocol=tcp sport=60693 dport=9207 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9207
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 60693
protocol: 6
streamName: meraki
clientIP: 212.242.255.185
serverIP: 43.201.106.214 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1673915364.143019630 M61_MX67C_Savannah flows src=27.253.216.80 dst=82.108.150.85 protocol=tcp sport=60693 dport=9207 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9207,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1673915364.143019630 M61_MX67C_Savannah flows src=27.253.216.80 dst=82.108.150.85 protocol=tcp sport=60693 dport=9207 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 60693,
"protocol": 6,
"streamName": "meraki",
"clientIP": "27.253.216.80",
"serverIP": "82.108.150.85"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1673915364.143019630 M61_MX67C_Savannah flows src=27.253.216.80 dst=82.108.150.85 protocol=tcp sport=60693 dport=9207 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1673915364.143019630 M61_MX67C_Savannah flows src=27.253.216.80 dst=82.108.150.85 protocol=tcp sport=60693 dport=9207 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9207
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 60693
protocol: 6
streamName: meraki
clientIP: 27.253.216.80
serverIP: 82.108.150.85 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1673915364.868465310 M61_MX67C_Savannah flows src=131.163.74.150 dst=191.184.35.228 protocol=tcp sport=40140 dport=9214 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9214,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1673915364.868465310 M61_MX67C_Savannah flows src=131.163.74.150 dst=191.184.35.228 protocol=tcp sport=40140 dport=9214 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 40140,
"protocol": 6,
"streamName": "meraki",
"clientIP": "131.163.74.150",
"serverIP": "191.184.35.228"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1673915364.868465310 M61_MX67C_Savannah flows src=131.163.74.150 dst=191.184.35.228 protocol=tcp sport=40140 dport=9214 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1673915364.868465310 M61_MX67C_Savannah flows src=131.163.74.150 dst=191.184.35.228 protocol=tcp sport=40140 dport=9214 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9214
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 40140
protocol: 6
streamName: meraki
clientIP: 131.163.74.150
serverIP: 191.184.35.228 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1673915364.868465310 M61_MX67C_Savannah flows src=174.245.44.38 dst=110.78.90.7 protocol=tcp sport=40140 dport=9214 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9214,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1673915364.868465310 M61_MX67C_Savannah flows src=174.245.44.38 dst=110.78.90.7 protocol=tcp sport=40140 dport=9214 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 40140,
"protocol": 6,
"streamName": "meraki",
"clientIP": "174.245.44.38",
"serverIP": "110.78.90.7"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1673915364.868465310 M61_MX67C_Savannah flows src=174.245.44.38 dst=110.78.90.7 protocol=tcp sport=40140 dport=9214 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1673915364.868465310 M61_MX67C_Savannah flows src=174.245.44.38 dst=110.78.90.7 protocol=tcp sport=40140 dport=9214 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9214
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 40140
protocol: 6
streamName: meraki
clientIP: 174.245.44.38
serverIP: 110.78.90.7 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1673915364.143019630 M61_MX67C_Savannah flows src=146.22.204.142 dst=94.42.223.207 protocol=tcp sport=60693 dport=9207 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9207,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1673915364.143019630 M61_MX67C_Savannah flows src=146.22.204.142 dst=94.42.223.207 protocol=tcp sport=60693 dport=9207 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 60693,
"protocol": 6,
"streamName": "meraki",
"clientIP": "146.22.204.142",
"serverIP": "94.42.223.207"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1673915364.143019630 M61_MX67C_Savannah flows src=146.22.204.142 dst=94.42.223.207 protocol=tcp sport=60693 dport=9207 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1673915364.143019630 M61_MX67C_Savannah flows src=146.22.204.142 dst=94.42.223.207 protocol=tcp sport=60693 dport=9207 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9207
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 60693
protocol: 6
streamName: meraki
clientIP: 146.22.204.142
serverIP: 94.42.223.207 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1673915364.143019630 M61_MX67C_Savannah flows src=230.8.34.97 dst=53.168.147.232 protocol=tcp sport=60693 dport=9207 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9207,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1673915364.143019630 M61_MX67C_Savannah flows src=230.8.34.97 dst=53.168.147.232 protocol=tcp sport=60693 dport=9207 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 60693,
"protocol": 6,
"streamName": "meraki",
"clientIP": "230.8.34.97",
"serverIP": "53.168.147.232"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1673915364.143019630 M61_MX67C_Savannah flows src=230.8.34.97 dst=53.168.147.232 protocol=tcp sport=60693 dport=9207 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1673915364.143019630 M61_MX67C_Savannah flows src=230.8.34.97 dst=53.168.147.232 protocol=tcp sport=60693 dport=9207 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9207
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 60693
protocol: 6
streamName: meraki
clientIP: 230.8.34.97
serverIP: 53.168.147.232 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1673915364.868465310 M61_MX67C_Savannah flows src=6.216.235.210 dst=218.231.128.114 protocol=tcp sport=40140 dport=9214 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9214,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1673915364.868465310 M61_MX67C_Savannah flows src=6.216.235.210 dst=218.231.128.114 protocol=tcp sport=40140 dport=9214 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 40140,
"protocol": 6,
"streamName": "meraki",
"clientIP": "6.216.235.210",
"serverIP": "218.231.128.114"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1673915364.868465310 M61_MX67C_Savannah flows src=6.216.235.210 dst=218.231.128.114 protocol=tcp sport=40140 dport=9214 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1673915364.868465310 M61_MX67C_Savannah flows src=6.216.235.210 dst=218.231.128.114 protocol=tcp sport=40140 dport=9214 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9214
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 40140
protocol: 6
streamName: meraki
clientIP: 6.216.235.210
serverIP: 218.231.128.114 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1673915364.868465310 M61_MX67C_Savannah flows src=28.22.83.220 dst=186.7.45.41 protocol=tcp sport=40140 dport=9214 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9214,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1673915364.868465310 M61_MX67C_Savannah flows src=28.22.83.220 dst=186.7.45.41 protocol=tcp sport=40140 dport=9214 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 40140,
"protocol": 6,
"streamName": "meraki",
"clientIP": "28.22.83.220",
"serverIP": "186.7.45.41"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1673915364.868465310 M61_MX67C_Savannah flows src=28.22.83.220 dst=186.7.45.41 protocol=tcp sport=40140 dport=9214 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1673915364.868465310 M61_MX67C_Savannah flows src=28.22.83.220 dst=186.7.45.41 protocol=tcp sport=40140 dport=9214 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9214
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 40140
protocol: 6
streamName: meraki
clientIP: 28.22.83.220
serverIP: 186.7.45.41 | Explain this syslog message |
<134>Original Address=10.11.22.1 1 1673915357.461849784 M22_MX67C_Marietta flows src=32.15.226.30 dst=148.2.99.56 protocol=tcp sport=56388 dport=9214 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9214,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=10.11.22.1 1 1673915357.461849784 M22_MX67C_Marietta flows src=32.15.226.30 dst=148.2.99.56 protocol=tcp sport=56388 dport=9214 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 56388,
"protocol": 6,
"streamName": "meraki",
"clientIP": "32.15.226.30",
"serverIP": "148.2.99.56"
} | Create a JSON artifact from the message |
<134>Original Address=10.11.22.1 1 1673915357.461849784 M22_MX67C_Marietta flows src=32.15.226.30 dst=148.2.99.56 protocol=tcp sport=56388 dport=9214 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=10.11.22.1 1 1673915357.461849784 M22_MX67C_Marietta flows src=32.15.226.30 dst=148.2.99.56 protocol=tcp sport=56388 dport=9214 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9214
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 56388
protocol: 6
streamName: meraki
clientIP: 32.15.226.30
serverIP: 148.2.99.56 | Explain this syslog message |
<134>Original Address=10.11.22.1 1 1673915357.461849784 M22_MX67C_Marietta flows src=201.142.120.166 dst=195.85.15.196 protocol=tcp sport=56388 dport=9214 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9214,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=10.11.22.1 1 1673915357.461849784 M22_MX67C_Marietta flows src=201.142.120.166 dst=195.85.15.196 protocol=tcp sport=56388 dport=9214 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 56388,
"protocol": 6,
"streamName": "meraki",
"clientIP": "201.142.120.166",
"serverIP": "195.85.15.196"
} | Create a JSON artifact from the message |
<134>Original Address=10.11.22.1 1 1673915357.461849784 M22_MX67C_Marietta flows src=201.142.120.166 dst=195.85.15.196 protocol=tcp sport=56388 dport=9214 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=10.11.22.1 1 1673915357.461849784 M22_MX67C_Marietta flows src=201.142.120.166 dst=195.85.15.196 protocol=tcp sport=56388 dport=9214 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9214
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 56388
protocol: 6
streamName: meraki
clientIP: 201.142.120.166
serverIP: 195.85.15.196 | Explain this syslog message |
<134>Original Address=10.11.22.1 1 1673915357.461849784 M22_MX67C_Marietta flows src=193.138.144.242 dst=28.219.236.252 protocol=tcp sport=56388 dport=9214 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9214,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=10.11.22.1 1 1673915357.461849784 M22_MX67C_Marietta flows src=193.138.144.242 dst=28.219.236.252 protocol=tcp sport=56388 dport=9214 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 56388,
"protocol": 6,
"streamName": "meraki",
"clientIP": "193.138.144.242",
"serverIP": "28.219.236.252"
} | Create a JSON artifact from the message |
<134>Original Address=10.11.22.1 1 1673915357.461849784 M22_MX67C_Marietta flows src=193.138.144.242 dst=28.219.236.252 protocol=tcp sport=56388 dport=9214 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=10.11.22.1 1 1673915357.461849784 M22_MX67C_Marietta flows src=193.138.144.242 dst=28.219.236.252 protocol=tcp sport=56388 dport=9214 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9214
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 56388
protocol: 6
streamName: meraki
clientIP: 193.138.144.242
serverIP: 28.219.236.252 | Explain this syslog message |
<134>Original Address=10.11.22.1 1 1673915357.461849784 M22_MX67C_Marietta flows src=25.18.68.199 dst=66.37.168.210 protocol=tcp sport=56388 dport=9214 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9214,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=10.11.22.1 1 1673915357.461849784 M22_MX67C_Marietta flows src=25.18.68.199 dst=66.37.168.210 protocol=tcp sport=56388 dport=9214 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 56388,
"protocol": 6,
"streamName": "meraki",
"clientIP": "25.18.68.199",
"serverIP": "66.37.168.210"
} | Create a JSON artifact from the message |
<134>Original Address=10.11.22.1 1 1673915357.461849784 M22_MX67C_Marietta flows src=25.18.68.199 dst=66.37.168.210 protocol=tcp sport=56388 dport=9214 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=10.11.22.1 1 1673915357.461849784 M22_MX67C_Marietta flows src=25.18.68.199 dst=66.37.168.210 protocol=tcp sport=56388 dport=9214 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9214
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 56388
protocol: 6
streamName: meraki
clientIP: 25.18.68.199
serverIP: 66.37.168.210 | Explain this syslog message |
<134>Original Address=143.194.202.212 1 1673915366.882753904 M162_MX67C_SavCCG flows src=46.207.89.7 dst=143.194.202.212 protocol=tcp sport=56483 dport=5016 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 5016,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=143.194.202.212 1 1673915366.882753904 M162_MX67C_SavCCG flows src=46.207.89.7 dst=143.194.202.212 protocol=tcp sport=56483 dport=5016 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 56483,
"protocol": 6,
"streamName": "meraki",
"clientIP": "46.207.89.7",
"serverIP": "143.194.202.212"
} | Create a JSON artifact from the message |
<134>Original Address=143.194.202.212 1 1673915366.882753904 M162_MX67C_SavCCG flows src=46.207.89.7 dst=143.194.202.212 protocol=tcp sport=56483 dport=5016 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=143.194.202.212 1 1673915366.882753904 M162_MX67C_SavCCG flows src=46.207.89.7 dst=143.194.202.212 protocol=tcp sport=56483 dport=5016 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5016
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 56483
protocol: 6
streamName: meraki
clientIP: 46.207.89.7
serverIP: 143.194.202.212 | Explain this syslog message |
<134>Original Address=93.78.208.83 1 1673915366.882753904 M162_MX67C_SavCCG flows src=45.124.3.53 dst=93.78.208.83 protocol=tcp sport=56483 dport=5016 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 5016,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=93.78.208.83 1 1673915366.882753904 M162_MX67C_SavCCG flows src=45.124.3.53 dst=93.78.208.83 protocol=tcp sport=56483 dport=5016 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 56483,
"protocol": 6,
"streamName": "meraki",
"clientIP": "45.124.3.53",
"serverIP": "93.78.208.83"
} | Create a JSON artifact from the message |
<134>Original Address=93.78.208.83 1 1673915366.882753904 M162_MX67C_SavCCG flows src=45.124.3.53 dst=93.78.208.83 protocol=tcp sport=56483 dport=5016 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=93.78.208.83 1 1673915366.882753904 M162_MX67C_SavCCG flows src=45.124.3.53 dst=93.78.208.83 protocol=tcp sport=56483 dport=5016 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5016
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 56483
protocol: 6
streamName: meraki
clientIP: 45.124.3.53
serverIP: 93.78.208.83 | Explain this syslog message |
<134>Original Address=244.238.166.72 1 1673915366.882753904 M162_MX67C_SavCCG flows src=212.251.219.53 dst=244.238.166.72 protocol=tcp sport=56483 dport=5016 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 5016,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=244.238.166.72 1 1673915366.882753904 M162_MX67C_SavCCG flows src=212.251.219.53 dst=244.238.166.72 protocol=tcp sport=56483 dport=5016 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 56483,
"protocol": 6,
"streamName": "meraki",
"clientIP": "212.251.219.53",
"serverIP": "244.238.166.72"
} | Create a JSON artifact from the message |
<134>Original Address=244.238.166.72 1 1673915366.882753904 M162_MX67C_SavCCG flows src=212.251.219.53 dst=244.238.166.72 protocol=tcp sport=56483 dport=5016 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=244.238.166.72 1 1673915366.882753904 M162_MX67C_SavCCG flows src=212.251.219.53 dst=244.238.166.72 protocol=tcp sport=56483 dport=5016 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5016
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 56483
protocol: 6
streamName: meraki
clientIP: 212.251.219.53
serverIP: 244.238.166.72 | Explain this syslog message |
<134>Original Address=41.219.28.220 1 1673915366.882753904 M162_MX67C_SavCCG flows src=47.80.30.88 dst=41.219.28.220 protocol=tcp sport=56483 dport=5016 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 5016,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=41.219.28.220 1 1673915366.882753904 M162_MX67C_SavCCG flows src=47.80.30.88 dst=41.219.28.220 protocol=tcp sport=56483 dport=5016 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 56483,
"protocol": 6,
"streamName": "meraki",
"clientIP": "47.80.30.88",
"serverIP": "41.219.28.220"
} | Create a JSON artifact from the message |
<134>Original Address=41.219.28.220 1 1673915366.882753904 M162_MX67C_SavCCG flows src=47.80.30.88 dst=41.219.28.220 protocol=tcp sport=56483 dport=5016 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=41.219.28.220 1 1673915366.882753904 M162_MX67C_SavCCG flows src=47.80.30.88 dst=41.219.28.220 protocol=tcp sport=56483 dport=5016 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5016
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 56483
protocol: 6
streamName: meraki
clientIP: 47.80.30.88
serverIP: 41.219.28.220 | Explain this syslog message |
<134>Original Address=64.139.91.93 1 1673915369.420001659 M64_MX67C_Augusta flows src=198.252.218.180 dst=240.118.109.77 protocol=tcp sport=12960 dport=54631 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 12960,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=64.139.91.93 1 1673915369.420001659 M64_MX67C_Augusta flows src=198.252.218.180 dst=240.118.109.77 protocol=tcp sport=12960 dport=54631 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 54631,
"protocol": 6,
"streamName": "meraki",
"clientIP": "240.118.109.77",
"serverIP": "198.252.218.180"
} | Create a JSON artifact from the message |
<134>Original Address=64.139.91.93 1 1673915369.420001659 M64_MX67C_Augusta flows src=198.252.218.180 dst=240.118.109.77 protocol=tcp sport=12960 dport=54631 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=64.139.91.93 1 1673915369.420001659 M64_MX67C_Augusta flows src=198.252.218.180 dst=240.118.109.77 protocol=tcp sport=12960 dport=54631 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 12960
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 54631
protocol: 6
streamName: meraki
clientIP: 240.118.109.77
serverIP: 198.252.218.180 | Explain this syslog message |
<134>Original Address=64.139.91.93 1 1673915369.420001659 M64_MX67C_Augusta flows src=0.102.173.19 dst=95.40.97.143 protocol=tcp sport=12960 dport=54631 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 12960,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=64.139.91.93 1 1673915369.420001659 M64_MX67C_Augusta flows src=0.102.173.19 dst=95.40.97.143 protocol=tcp sport=12960 dport=54631 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 54631,
"protocol": 6,
"streamName": "meraki",
"clientIP": "95.40.97.143",
"serverIP": "0.102.173.19"
} | Create a JSON artifact from the message |
<134>Original Address=64.139.91.93 1 1673915369.420001659 M64_MX67C_Augusta flows src=0.102.173.19 dst=95.40.97.143 protocol=tcp sport=12960 dport=54631 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=64.139.91.93 1 1673915369.420001659 M64_MX67C_Augusta flows src=0.102.173.19 dst=95.40.97.143 protocol=tcp sport=12960 dport=54631 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 12960
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 54631
protocol: 6
streamName: meraki
clientIP: 95.40.97.143
serverIP: 0.102.173.19 | Explain this syslog message |
<134>Original Address=64.139.91.93 1 1673915369.420001659 M64_MX67C_Augusta flows src=185.184.193.152 dst=54.127.45.98 protocol=tcp sport=12960 dport=54631 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 12960,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=64.139.91.93 1 1673915369.420001659 M64_MX67C_Augusta flows src=185.184.193.152 dst=54.127.45.98 protocol=tcp sport=12960 dport=54631 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 54631,
"protocol": 6,
"streamName": "meraki",
"clientIP": "54.127.45.98",
"serverIP": "185.184.193.152"
} | Create a JSON artifact from the message |
<134>Original Address=64.139.91.93 1 1673915369.420001659 M64_MX67C_Augusta flows src=185.184.193.152 dst=54.127.45.98 protocol=tcp sport=12960 dport=54631 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=64.139.91.93 1 1673915369.420001659 M64_MX67C_Augusta flows src=185.184.193.152 dst=54.127.45.98 protocol=tcp sport=12960 dport=54631 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 12960
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 54631
protocol: 6
streamName: meraki
clientIP: 54.127.45.98
serverIP: 185.184.193.152 | Explain this syslog message |
<134>Original Address=64.139.91.93 1 1673915369.420001659 M64_MX67C_Augusta flows src=73.133.18.6 dst=205.125.244.170 protocol=tcp sport=12960 dport=54631 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 12960,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=64.139.91.93 1 1673915369.420001659 M64_MX67C_Augusta flows src=73.133.18.6 dst=205.125.244.170 protocol=tcp sport=12960 dport=54631 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 54631,
"protocol": 6,
"streamName": "meraki",
"clientIP": "205.125.244.170",
"serverIP": "73.133.18.6"
} | Create a JSON artifact from the message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.