input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<134>Original Address=64.139.91.93 1 1673915369.420001659 M64_MX67C_Augusta flows src=73.133.18.6 dst=205.125.244.170 protocol=tcp sport=12960 dport=54631 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=64.139.91.93 1 1673915369.420001659 M64_MX67C_Augusta flows src=73.133.18.6 dst=205.125.244.170 protocol=tcp sport=12960 dport=54631 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 12960
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 54631
protocol: 6
streamName: meraki
clientIP: 205.125.244.170
serverIP: 73.133.18.6 | Explain this syslog message |
<134>Original Address=35.135.130.90 1 1673915354.970386694 M49_MX67C_Montgomery flows src=189.134.195.195 dst=86.215.171.49 protocol=tcp sport=40426 dport=9214 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9214,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=35.135.130.90 1 1673915354.970386694 M49_MX67C_Montgomery flows src=189.134.195.195 dst=86.215.171.49 protocol=tcp sport=40426 dport=9214 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 40426,
"protocol": 6,
"streamName": "meraki",
"clientIP": "189.134.195.195",
"serverIP": "86.215.171.49"
} | Create a JSON artifact from the message |
<134>Original Address=35.135.130.90 1 1673915354.970386694 M49_MX67C_Montgomery flows src=189.134.195.195 dst=86.215.171.49 protocol=tcp sport=40426 dport=9214 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=35.135.130.90 1 1673915354.970386694 M49_MX67C_Montgomery flows src=189.134.195.195 dst=86.215.171.49 protocol=tcp sport=40426 dport=9214 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9214
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 40426
protocol: 6
streamName: meraki
clientIP: 189.134.195.195
serverIP: 86.215.171.49 | Explain this syslog message |
<134>Original Address=35.135.130.90 1 1673915354.970386694 M49_MX67C_Montgomery flows src=90.13.168.226 dst=97.80.10.81 protocol=tcp sport=40426 dport=9214 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9214,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=35.135.130.90 1 1673915354.970386694 M49_MX67C_Montgomery flows src=90.13.168.226 dst=97.80.10.81 protocol=tcp sport=40426 dport=9214 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 40426,
"protocol": 6,
"streamName": "meraki",
"clientIP": "90.13.168.226",
"serverIP": "97.80.10.81"
} | Create a JSON artifact from the message |
<134>Original Address=35.135.130.90 1 1673915354.970386694 M49_MX67C_Montgomery flows src=90.13.168.226 dst=97.80.10.81 protocol=tcp sport=40426 dport=9214 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=35.135.130.90 1 1673915354.970386694 M49_MX67C_Montgomery flows src=90.13.168.226 dst=97.80.10.81 protocol=tcp sport=40426 dport=9214 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9214
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 40426
protocol: 6
streamName: meraki
clientIP: 90.13.168.226
serverIP: 97.80.10.81 | Explain this syslog message |
<134>Original Address=35.135.130.90 1 1673915354.970386694 M49_MX67C_Montgomery flows src=108.162.161.221 dst=154.11.216.98 protocol=tcp sport=40426 dport=9214 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9214,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=35.135.130.90 1 1673915354.970386694 M49_MX67C_Montgomery flows src=108.162.161.221 dst=154.11.216.98 protocol=tcp sport=40426 dport=9214 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 40426,
"protocol": 6,
"streamName": "meraki",
"clientIP": "108.162.161.221",
"serverIP": "154.11.216.98"
} | Create a JSON artifact from the message |
<134>Original Address=35.135.130.90 1 1673915354.970386694 M49_MX67C_Montgomery flows src=108.162.161.221 dst=154.11.216.98 protocol=tcp sport=40426 dport=9214 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=35.135.130.90 1 1673915354.970386694 M49_MX67C_Montgomery flows src=108.162.161.221 dst=154.11.216.98 protocol=tcp sport=40426 dport=9214 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9214
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 40426
protocol: 6
streamName: meraki
clientIP: 108.162.161.221
serverIP: 154.11.216.98 | Explain this syslog message |
<134>Original Address=35.135.130.90 1 1673915354.970386694 M49_MX67C_Montgomery flows src=12.54.43.62 dst=186.253.232.89 protocol=tcp sport=40426 dport=9214 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9214,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=35.135.130.90 1 1673915354.970386694 M49_MX67C_Montgomery flows src=12.54.43.62 dst=186.253.232.89 protocol=tcp sport=40426 dport=9214 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 40426,
"protocol": 6,
"streamName": "meraki",
"clientIP": "12.54.43.62",
"serverIP": "186.253.232.89"
} | Create a JSON artifact from the message |
<134>Original Address=35.135.130.90 1 1673915354.970386694 M49_MX67C_Montgomery flows src=12.54.43.62 dst=186.253.232.89 protocol=tcp sport=40426 dport=9214 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=35.135.130.90 1 1673915354.970386694 M49_MX67C_Montgomery flows src=12.54.43.62 dst=186.253.232.89 protocol=tcp sport=40426 dport=9214 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9214
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 40426
protocol: 6
streamName: meraki
clientIP: 12.54.43.62
serverIP: 186.253.232.89 | Explain this syslog message |
<134>Original Address=64.139.91.93 1 1673915371.281369861 M64_MX67C_Augusta flows src=48.107.146.229 dst=52.55.141.253 protocol=tcp sport=50982 dport=2825 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 2825,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=64.139.91.93 1 1673915371.281369861 M64_MX67C_Augusta flows src=48.107.146.229 dst=52.55.141.253 protocol=tcp sport=50982 dport=2825 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 50982,
"protocol": 6,
"streamName": "meraki",
"clientIP": "48.107.146.229",
"serverIP": "52.55.141.253"
} | Create a JSON artifact from the message |
<134>Original Address=64.139.91.93 1 1673915371.281369861 M64_MX67C_Augusta flows src=48.107.146.229 dst=52.55.141.253 protocol=tcp sport=50982 dport=2825 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=64.139.91.93 1 1673915371.281369861 M64_MX67C_Augusta flows src=48.107.146.229 dst=52.55.141.253 protocol=tcp sport=50982 dport=2825 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 2825
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 50982
protocol: 6
streamName: meraki
clientIP: 48.107.146.229
serverIP: 52.55.141.253 | Explain this syslog message |
<134>Original Address=64.139.91.93 1 1673915371.281369861 M64_MX67C_Augusta flows src=133.104.91.250 dst=6.174.254.181 protocol=tcp sport=50982 dport=2825 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 2825,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=64.139.91.93 1 1673915371.281369861 M64_MX67C_Augusta flows src=133.104.91.250 dst=6.174.254.181 protocol=tcp sport=50982 dport=2825 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 50982,
"protocol": 6,
"streamName": "meraki",
"clientIP": "133.104.91.250",
"serverIP": "6.174.254.181"
} | Create a JSON artifact from the message |
<134>Original Address=64.139.91.93 1 1673915371.281369861 M64_MX67C_Augusta flows src=133.104.91.250 dst=6.174.254.181 protocol=tcp sport=50982 dport=2825 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=64.139.91.93 1 1673915371.281369861 M64_MX67C_Augusta flows src=133.104.91.250 dst=6.174.254.181 protocol=tcp sport=50982 dport=2825 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 2825
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 50982
protocol: 6
streamName: meraki
clientIP: 133.104.91.250
serverIP: 6.174.254.181 | Explain this syslog message |
<134>Original Address=64.139.91.93 1 1673915371.281369861 M64_MX67C_Augusta flows src=48.118.11.169 dst=56.53.65.34 protocol=tcp sport=50982 dport=2825 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 2825,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=64.139.91.93 1 1673915371.281369861 M64_MX67C_Augusta flows src=48.118.11.169 dst=56.53.65.34 protocol=tcp sport=50982 dport=2825 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 50982,
"protocol": 6,
"streamName": "meraki",
"clientIP": "48.118.11.169",
"serverIP": "56.53.65.34"
} | Create a JSON artifact from the message |
<134>Original Address=64.139.91.93 1 1673915371.281369861 M64_MX67C_Augusta flows src=48.118.11.169 dst=56.53.65.34 protocol=tcp sport=50982 dport=2825 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=64.139.91.93 1 1673915371.281369861 M64_MX67C_Augusta flows src=48.118.11.169 dst=56.53.65.34 protocol=tcp sport=50982 dport=2825 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 2825
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 50982
protocol: 6
streamName: meraki
clientIP: 48.118.11.169
serverIP: 56.53.65.34 | Explain this syslog message |
<134>Original Address=64.139.91.93 1 1673915371.281369861 M64_MX67C_Augusta flows src=202.33.132.142 dst=83.141.246.185 protocol=tcp sport=50982 dport=2825 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 2825,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=64.139.91.93 1 1673915371.281369861 M64_MX67C_Augusta flows src=202.33.132.142 dst=83.141.246.185 protocol=tcp sport=50982 dport=2825 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 50982,
"protocol": 6,
"streamName": "meraki",
"clientIP": "202.33.132.142",
"serverIP": "83.141.246.185"
} | Create a JSON artifact from the message |
<134>Original Address=64.139.91.93 1 1673915371.281369861 M64_MX67C_Augusta flows src=202.33.132.142 dst=83.141.246.185 protocol=tcp sport=50982 dport=2825 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=64.139.91.93 1 1673915371.281369861 M64_MX67C_Augusta flows src=202.33.132.142 dst=83.141.246.185 protocol=tcp sport=50982 dport=2825 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 2825
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 50982
protocol: 6
streamName: meraki
clientIP: 202.33.132.142
serverIP: 83.141.246.185 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1673915370.605671750 M61_MX67C_Savannah flows src=36.51.71.238 dst=18.121.112.6 protocol=tcp sport=26069 dport=22 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 22,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1673915370.605671750 M61_MX67C_Savannah flows src=36.51.71.238 dst=18.121.112.6 protocol=tcp sport=26069 dport=22 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 26069,
"protocol": 6,
"streamName": "meraki",
"clientIP": "36.51.71.238",
"serverIP": "18.121.112.6"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1673915370.605671750 M61_MX67C_Savannah flows src=36.51.71.238 dst=18.121.112.6 protocol=tcp sport=26069 dport=22 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1673915370.605671750 M61_MX67C_Savannah flows src=36.51.71.238 dst=18.121.112.6 protocol=tcp sport=26069 dport=22 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 22
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 26069
protocol: 6
streamName: meraki
clientIP: 36.51.71.238
serverIP: 18.121.112.6 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1673915370.605671750 M61_MX67C_Savannah flows src=8.45.74.245 dst=255.160.177.230 protocol=tcp sport=26069 dport=22 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 22,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1673915370.605671750 M61_MX67C_Savannah flows src=8.45.74.245 dst=255.160.177.230 protocol=tcp sport=26069 dport=22 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 26069,
"protocol": 6,
"streamName": "meraki",
"clientIP": "8.45.74.245",
"serverIP": "255.160.177.230"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1673915370.605671750 M61_MX67C_Savannah flows src=8.45.74.245 dst=255.160.177.230 protocol=tcp sport=26069 dport=22 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1673915370.605671750 M61_MX67C_Savannah flows src=8.45.74.245 dst=255.160.177.230 protocol=tcp sport=26069 dport=22 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 22
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 26069
protocol: 6
streamName: meraki
clientIP: 8.45.74.245
serverIP: 255.160.177.230 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1673915370.605671750 M61_MX67C_Savannah flows src=152.74.242.27 dst=64.69.90.218 protocol=tcp sport=26069 dport=22 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 22,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1673915370.605671750 M61_MX67C_Savannah flows src=152.74.242.27 dst=64.69.90.218 protocol=tcp sport=26069 dport=22 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 26069,
"protocol": 6,
"streamName": "meraki",
"clientIP": "152.74.242.27",
"serverIP": "64.69.90.218"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1673915370.605671750 M61_MX67C_Savannah flows src=152.74.242.27 dst=64.69.90.218 protocol=tcp sport=26069 dport=22 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1673915370.605671750 M61_MX67C_Savannah flows src=152.74.242.27 dst=64.69.90.218 protocol=tcp sport=26069 dport=22 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 22
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 26069
protocol: 6
streamName: meraki
clientIP: 152.74.242.27
serverIP: 64.69.90.218 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1673915370.605671750 M61_MX67C_Savannah flows src=19.179.156.52 dst=13.233.2.102 protocol=tcp sport=26069 dport=22 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 22,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1673915370.605671750 M61_MX67C_Savannah flows src=19.179.156.52 dst=13.233.2.102 protocol=tcp sport=26069 dport=22 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 26069,
"protocol": 6,
"streamName": "meraki",
"clientIP": "19.179.156.52",
"serverIP": "13.233.2.102"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1673915370.605671750 M61_MX67C_Savannah flows src=19.179.156.52 dst=13.233.2.102 protocol=tcp sport=26069 dport=22 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1673915370.605671750 M61_MX67C_Savannah flows src=19.179.156.52 dst=13.233.2.102 protocol=tcp sport=26069 dport=22 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 22
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 26069
protocol: 6
streamName: meraki
clientIP: 19.179.156.52
serverIP: 13.233.2.102 | Explain this syslog message |
<134>Original Address=64.139.91.93 1 1673915366.596374294 M64_MX67C_Augusta flows src=117.139.238.168 dst=203.134.241.91 protocol=tcp sport=33720 dport=9207 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9207,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=64.139.91.93 1 1673915366.596374294 M64_MX67C_Augusta flows src=117.139.238.168 dst=203.134.241.91 protocol=tcp sport=33720 dport=9207 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 33720,
"protocol": 6,
"streamName": "meraki",
"clientIP": "117.139.238.168",
"serverIP": "203.134.241.91"
} | Create a JSON artifact from the message |
<134>Original Address=64.139.91.93 1 1673915366.596374294 M64_MX67C_Augusta flows src=117.139.238.168 dst=203.134.241.91 protocol=tcp sport=33720 dport=9207 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=64.139.91.93 1 1673915366.596374294 M64_MX67C_Augusta flows src=117.139.238.168 dst=203.134.241.91 protocol=tcp sport=33720 dport=9207 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9207
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 33720
protocol: 6
streamName: meraki
clientIP: 117.139.238.168
serverIP: 203.134.241.91 | Explain this syslog message |
<134>Original Address=64.139.91.93 1 1673915366.596374294 M64_MX67C_Augusta flows src=4.239.244.48 dst=165.75.180.212 protocol=tcp sport=33720 dport=9207 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9207,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=64.139.91.93 1 1673915366.596374294 M64_MX67C_Augusta flows src=4.239.244.48 dst=165.75.180.212 protocol=tcp sport=33720 dport=9207 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 33720,
"protocol": 6,
"streamName": "meraki",
"clientIP": "4.239.244.48",
"serverIP": "165.75.180.212"
} | Create a JSON artifact from the message |
<134>Original Address=64.139.91.93 1 1673915366.596374294 M64_MX67C_Augusta flows src=4.239.244.48 dst=165.75.180.212 protocol=tcp sport=33720 dport=9207 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=64.139.91.93 1 1673915366.596374294 M64_MX67C_Augusta flows src=4.239.244.48 dst=165.75.180.212 protocol=tcp sport=33720 dport=9207 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9207
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 33720
protocol: 6
streamName: meraki
clientIP: 4.239.244.48
serverIP: 165.75.180.212 | Explain this syslog message |
<134>Original Address=64.139.91.93 1 1673915366.596374294 M64_MX67C_Augusta flows src=180.71.25.202 dst=239.204.156.206 protocol=tcp sport=33720 dport=9207 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9207,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=64.139.91.93 1 1673915366.596374294 M64_MX67C_Augusta flows src=180.71.25.202 dst=239.204.156.206 protocol=tcp sport=33720 dport=9207 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 33720,
"protocol": 6,
"streamName": "meraki",
"clientIP": "180.71.25.202",
"serverIP": "239.204.156.206"
} | Create a JSON artifact from the message |
<134>Original Address=64.139.91.93 1 1673915366.596374294 M64_MX67C_Augusta flows src=180.71.25.202 dst=239.204.156.206 protocol=tcp sport=33720 dport=9207 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=64.139.91.93 1 1673915366.596374294 M64_MX67C_Augusta flows src=180.71.25.202 dst=239.204.156.206 protocol=tcp sport=33720 dport=9207 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9207
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 33720
protocol: 6
streamName: meraki
clientIP: 180.71.25.202
serverIP: 239.204.156.206 | Explain this syslog message |
<134>Original Address=64.139.91.93 1 1673915366.596374294 M64_MX67C_Augusta flows src=177.60.57.226 dst=71.255.182.153 protocol=tcp sport=33720 dport=9207 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9207,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=64.139.91.93 1 1673915366.596374294 M64_MX67C_Augusta flows src=177.60.57.226 dst=71.255.182.153 protocol=tcp sport=33720 dport=9207 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 33720,
"protocol": 6,
"streamName": "meraki",
"clientIP": "177.60.57.226",
"serverIP": "71.255.182.153"
} | Create a JSON artifact from the message |
<134>Original Address=64.139.91.93 1 1673915366.596374294 M64_MX67C_Augusta flows src=177.60.57.226 dst=71.255.182.153 protocol=tcp sport=33720 dport=9207 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=64.139.91.93 1 1673915366.596374294 M64_MX67C_Augusta flows src=177.60.57.226 dst=71.255.182.153 protocol=tcp sport=33720 dport=9207 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9207
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 33720
protocol: 6
streamName: meraki
clientIP: 177.60.57.226
serverIP: 71.255.182.153 | Explain this syslog message |
<134>Original Address=35.135.130.90 1 1673915371.491242654 M49_MX67C_Montgomery flows src=119.236.6.103 dst=114.57.104.24 protocol=tcp sport=35203 dport=9214 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9214,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=35.135.130.90 1 1673915371.491242654 M49_MX67C_Montgomery flows src=119.236.6.103 dst=114.57.104.24 protocol=tcp sport=35203 dport=9214 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 35203,
"protocol": 6,
"streamName": "meraki",
"clientIP": "119.236.6.103",
"serverIP": "114.57.104.24"
} | Create a JSON artifact from the message |
<134>Original Address=35.135.130.90 1 1673915371.491242654 M49_MX67C_Montgomery flows src=119.236.6.103 dst=114.57.104.24 protocol=tcp sport=35203 dport=9214 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=35.135.130.90 1 1673915371.491242654 M49_MX67C_Montgomery flows src=119.236.6.103 dst=114.57.104.24 protocol=tcp sport=35203 dport=9214 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9214
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 35203
protocol: 6
streamName: meraki
clientIP: 119.236.6.103
serverIP: 114.57.104.24 | Explain this syslog message |
<134>Original Address=35.135.130.90 1 1673915371.491242654 M49_MX67C_Montgomery flows src=188.225.253.147 dst=75.140.80.182 protocol=tcp sport=35203 dport=9214 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9214,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=35.135.130.90 1 1673915371.491242654 M49_MX67C_Montgomery flows src=188.225.253.147 dst=75.140.80.182 protocol=tcp sport=35203 dport=9214 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 35203,
"protocol": 6,
"streamName": "meraki",
"clientIP": "188.225.253.147",
"serverIP": "75.140.80.182"
} | Create a JSON artifact from the message |
<134>Original Address=35.135.130.90 1 1673915371.491242654 M49_MX67C_Montgomery flows src=188.225.253.147 dst=75.140.80.182 protocol=tcp sport=35203 dport=9214 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=35.135.130.90 1 1673915371.491242654 M49_MX67C_Montgomery flows src=188.225.253.147 dst=75.140.80.182 protocol=tcp sport=35203 dport=9214 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9214
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 35203
protocol: 6
streamName: meraki
clientIP: 188.225.253.147
serverIP: 75.140.80.182 | Explain this syslog message |
<134>Original Address=35.135.130.90 1 1673915371.491242654 M49_MX67C_Montgomery flows src=54.161.213.220 dst=1.114.29.151 protocol=tcp sport=35203 dport=9214 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9214,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=35.135.130.90 1 1673915371.491242654 M49_MX67C_Montgomery flows src=54.161.213.220 dst=1.114.29.151 protocol=tcp sport=35203 dport=9214 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 35203,
"protocol": 6,
"streamName": "meraki",
"clientIP": "54.161.213.220",
"serverIP": "1.114.29.151"
} | Create a JSON artifact from the message |
<134>Original Address=35.135.130.90 1 1673915371.491242654 M49_MX67C_Montgomery flows src=54.161.213.220 dst=1.114.29.151 protocol=tcp sport=35203 dport=9214 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=35.135.130.90 1 1673915371.491242654 M49_MX67C_Montgomery flows src=54.161.213.220 dst=1.114.29.151 protocol=tcp sport=35203 dport=9214 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9214
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 35203
protocol: 6
streamName: meraki
clientIP: 54.161.213.220
serverIP: 1.114.29.151 | Explain this syslog message |
<134>Original Address=35.135.130.90 1 1673915371.491242654 M49_MX67C_Montgomery flows src=44.22.161.14 dst=104.2.170.234 protocol=tcp sport=35203 dport=9214 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 9214,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=35.135.130.90 1 1673915371.491242654 M49_MX67C_Montgomery flows src=44.22.161.14 dst=104.2.170.234 protocol=tcp sport=35203 dport=9214 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 35203,
"protocol": 6,
"streamName": "meraki",
"clientIP": "44.22.161.14",
"serverIP": "104.2.170.234"
} | Create a JSON artifact from the message |
<134>Original Address=35.135.130.90 1 1673915371.491242654 M49_MX67C_Montgomery flows src=44.22.161.14 dst=104.2.170.234 protocol=tcp sport=35203 dport=9214 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=35.135.130.90 1 1673915371.491242654 M49_MX67C_Montgomery flows src=44.22.161.14 dst=104.2.170.234 protocol=tcp sport=35203 dport=9214 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 9214
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 35203
protocol: 6
streamName: meraki
clientIP: 44.22.161.14
serverIP: 104.2.170.234 | Explain this syslog message |
<164>Feb 08 2023 17:05:00: %ASA-4-106023: Deny tcp src outside:87.135.62.17/12976 dst dmz-1:154.195.196.98/8172 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8172,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 08 2023 17:05:00: %ASA-4-106023: Deny tcp src outside:87.135.62.17/12976 dst dmz-1:154.195.196.98/8172 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 12976,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "87.135.62.17",
"serverIP": "154.195.196.98"
} | Create a JSON artifact from the message |
<164>Feb 08 2023 17:05:00: %ASA-4-106023: Deny tcp src outside:87.135.62.17/12976 dst dmz-1:154.195.196.98/8172 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Feb 08 2023 17:05:00: %ASA-4-106023: Deny tcp src outside:87.135.62.17/12976 dst dmz-1:154.195.196.98/8172 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8172
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 12976
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 87.135.62.17
serverIP: 154.195.196.98 | Explain this syslog message |
<164>Feb 08 2023 17:05:00: %ASA-4-106023: Deny tcp src outside:65.114.56.205/12976 dst dmz-1:0.71.143.93/8172 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8172,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 08 2023 17:05:00: %ASA-4-106023: Deny tcp src outside:65.114.56.205/12976 dst dmz-1:0.71.143.93/8172 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 12976,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "65.114.56.205",
"serverIP": "0.71.143.93"
} | Create a JSON artifact from the message |
<164>Feb 08 2023 17:05:00: %ASA-4-106023: Deny tcp src outside:65.114.56.205/12976 dst dmz-1:0.71.143.93/8172 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Feb 08 2023 17:05:00: %ASA-4-106023: Deny tcp src outside:65.114.56.205/12976 dst dmz-1:0.71.143.93/8172 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8172
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 12976
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 65.114.56.205
serverIP: 0.71.143.93 | Explain this syslog message |
<164>Feb 08 2023 17:05:00: %ASA-4-106023: Deny tcp src outside:164.176.139.14/12976 dst dmz-1:249.15.53.21/8172 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8172,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 08 2023 17:05:00: %ASA-4-106023: Deny tcp src outside:164.176.139.14/12976 dst dmz-1:249.15.53.21/8172 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 12976,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "164.176.139.14",
"serverIP": "249.15.53.21"
} | Create a JSON artifact from the message |
<164>Feb 08 2023 17:05:00: %ASA-4-106023: Deny tcp src outside:164.176.139.14/12976 dst dmz-1:249.15.53.21/8172 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Feb 08 2023 17:05:00: %ASA-4-106023: Deny tcp src outside:164.176.139.14/12976 dst dmz-1:249.15.53.21/8172 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8172
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 12976
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 164.176.139.14
serverIP: 249.15.53.21 | Explain this syslog message |
<164>Feb 08 2023 17:05:00: %ASA-4-106023: Deny tcp src outside:109.145.124.73/12976 dst dmz-1:83.224.40.82/8172 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8172,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Feb 08 2023 17:05:00: %ASA-4-106023: Deny tcp src outside:109.145.124.73/12976 dst dmz-1:83.224.40.82/8172 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 12976,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 6,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "109.145.124.73",
"serverIP": "83.224.40.82"
} | Create a JSON artifact from the message |
<164>Feb 08 2023 17:05:00: %ASA-4-106023: Deny tcp src outside:109.145.124.73/12976 dst dmz-1:83.224.40.82/8172 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Feb 08 2023 17:05:00: %ASA-4-106023: Deny tcp src outside:109.145.124.73/12976 dst dmz-1:83.224.40.82/8172 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8172
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 12976
vendorcode: ASA-4-106023
action: block
protocol: 6
facilitycode: 20
streamName: cisco_asa
clientIP: 109.145.124.73
serverIP: 83.224.40.82 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660778871.144834043 NORDC_MX400_1 flows src=229.46.84.33 dst=19.166.3.234 protocol=udp sport=5090 dport=5060 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 5060,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660778871.144834043 NORDC_MX400_1 flows src=229.46.84.33 dst=19.166.3.234 protocol=udp sport=5090 dport=5060 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 5090,
"protocol": 17,
"streamName": "meraki",
"clientIP": "229.46.84.33",
"serverIP": "19.166.3.234"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660778871.144834043 NORDC_MX400_1 flows src=229.46.84.33 dst=19.166.3.234 protocol=udp sport=5090 dport=5060 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660778871.144834043 NORDC_MX400_1 flows src=229.46.84.33 dst=19.166.3.234 protocol=udp sport=5090 dport=5060 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5060
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 5090
protocol: 17
streamName: meraki
clientIP: 229.46.84.33
serverIP: 19.166.3.234 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660778871.144834043 NORDC_MX400_1 flows src=78.225.247.198 dst=219.168.50.103 protocol=udp sport=5090 dport=5060 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 5060,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660778871.144834043 NORDC_MX400_1 flows src=78.225.247.198 dst=219.168.50.103 protocol=udp sport=5090 dport=5060 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 5090,
"protocol": 17,
"streamName": "meraki",
"clientIP": "78.225.247.198",
"serverIP": "219.168.50.103"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660778871.144834043 NORDC_MX400_1 flows src=78.225.247.198 dst=219.168.50.103 protocol=udp sport=5090 dport=5060 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660778871.144834043 NORDC_MX400_1 flows src=78.225.247.198 dst=219.168.50.103 protocol=udp sport=5090 dport=5060 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5060
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 5090
protocol: 17
streamName: meraki
clientIP: 78.225.247.198
serverIP: 219.168.50.103 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660778871.144834043 NORDC_MX400_1 flows src=202.150.79.10 dst=130.17.85.42 protocol=udp sport=5090 dport=5060 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 5060,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660778871.144834043 NORDC_MX400_1 flows src=202.150.79.10 dst=130.17.85.42 protocol=udp sport=5090 dport=5060 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 5090,
"protocol": 17,
"streamName": "meraki",
"clientIP": "202.150.79.10",
"serverIP": "130.17.85.42"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660778871.144834043 NORDC_MX400_1 flows src=202.150.79.10 dst=130.17.85.42 protocol=udp sport=5090 dport=5060 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660778871.144834043 NORDC_MX400_1 flows src=202.150.79.10 dst=130.17.85.42 protocol=udp sport=5090 dport=5060 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5060
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 5090
protocol: 17
streamName: meraki
clientIP: 202.150.79.10
serverIP: 130.17.85.42 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660778871.144834043 NORDC_MX400_1 flows src=217.220.26.166 dst=221.180.112.131 protocol=udp sport=5090 dport=5060 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 5060,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660778871.144834043 NORDC_MX400_1 flows src=217.220.26.166 dst=221.180.112.131 protocol=udp sport=5090 dport=5060 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 5090,
"protocol": 17,
"streamName": "meraki",
"clientIP": "217.220.26.166",
"serverIP": "221.180.112.131"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660778871.144834043 NORDC_MX400_1 flows src=217.220.26.166 dst=221.180.112.131 protocol=udp sport=5090 dport=5060 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660778871.144834043 NORDC_MX400_1 flows src=217.220.26.166 dst=221.180.112.131 protocol=udp sport=5090 dport=5060 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5060
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 5090
protocol: 17
streamName: meraki
clientIP: 217.220.26.166
serverIP: 221.180.112.131 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660778875.039640661 NORDC_MX400_1 flows src=142.27.172.161 dst=31.30.127.138 protocol=udp sport=46849 dport=161 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 161,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660778875.039640661 NORDC_MX400_1 flows src=142.27.172.161 dst=31.30.127.138 protocol=udp sport=46849 dport=161 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 46849,
"protocol": 17,
"streamName": "meraki",
"clientIP": "142.27.172.161",
"serverIP": "31.30.127.138"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660778875.039640661 NORDC_MX400_1 flows src=142.27.172.161 dst=31.30.127.138 protocol=udp sport=46849 dport=161 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660778875.039640661 NORDC_MX400_1 flows src=142.27.172.161 dst=31.30.127.138 protocol=udp sport=46849 dport=161 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 161
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 46849
protocol: 17
streamName: meraki
clientIP: 142.27.172.161
serverIP: 31.30.127.138 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660778875.039640661 NORDC_MX400_1 flows src=248.162.219.242 dst=40.113.221.157 protocol=udp sport=46849 dport=161 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 161,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660778875.039640661 NORDC_MX400_1 flows src=248.162.219.242 dst=40.113.221.157 protocol=udp sport=46849 dport=161 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 46849,
"protocol": 17,
"streamName": "meraki",
"clientIP": "248.162.219.242",
"serverIP": "40.113.221.157"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660778875.039640661 NORDC_MX400_1 flows src=248.162.219.242 dst=40.113.221.157 protocol=udp sport=46849 dport=161 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660778875.039640661 NORDC_MX400_1 flows src=248.162.219.242 dst=40.113.221.157 protocol=udp sport=46849 dport=161 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 161
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 46849
protocol: 17
streamName: meraki
clientIP: 248.162.219.242
serverIP: 40.113.221.157 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660778875.039640661 NORDC_MX400_1 flows src=217.242.223.204 dst=74.147.244.247 protocol=udp sport=46849 dport=161 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 161,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660778875.039640661 NORDC_MX400_1 flows src=217.242.223.204 dst=74.147.244.247 protocol=udp sport=46849 dport=161 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 46849,
"protocol": 17,
"streamName": "meraki",
"clientIP": "217.242.223.204",
"serverIP": "74.147.244.247"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660778875.039640661 NORDC_MX400_1 flows src=217.242.223.204 dst=74.147.244.247 protocol=udp sport=46849 dport=161 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660778875.039640661 NORDC_MX400_1 flows src=217.242.223.204 dst=74.147.244.247 protocol=udp sport=46849 dport=161 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 161
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 46849
protocol: 17
streamName: meraki
clientIP: 217.242.223.204
serverIP: 74.147.244.247 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660778875.039640661 NORDC_MX400_1 flows src=36.41.153.143 dst=67.183.71.163 protocol=udp sport=46849 dport=161 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 161,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660778875.039640661 NORDC_MX400_1 flows src=36.41.153.143 dst=67.183.71.163 protocol=udp sport=46849 dport=161 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 46849,
"protocol": 17,
"streamName": "meraki",
"clientIP": "36.41.153.143",
"serverIP": "67.183.71.163"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660778875.039640661 NORDC_MX400_1 flows src=36.41.153.143 dst=67.183.71.163 protocol=udp sport=46849 dport=161 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660778875.039640661 NORDC_MX400_1 flows src=36.41.153.143 dst=67.183.71.163 protocol=udp sport=46849 dport=161 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 161
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 46849
protocol: 17
streamName: meraki
clientIP: 36.41.153.143
serverIP: 67.183.71.163 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660778876.429436286 NORDC_MX400_1 flows src=10.155.159.167 dst=208.241.163.125 protocol=udp sport=60362 dport=161 pattern: 1 dst 208.241.163.125 | {
"senderhost": "192.168.2.250",
"serverport": 161,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660778876.429436286 NORDC_MX400_1 flows src=10.155.159.167 dst=208.241.163.125 protocol=udp sport=60362 dport=161 pattern: 1 dst 208.241.163.125",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 60362,
"protocol": 17,
"streamName": "meraki",
"clientIP": "10.155.159.167",
"serverIP": "208.241.163.125"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660778876.429436286 NORDC_MX400_1 flows src=10.155.159.167 dst=208.241.163.125 protocol=udp sport=60362 dport=161 pattern: 1 dst 208.241.163.125 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.