input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<164>Sep 18 2022 12:19:45: %ASA-4-106023: Deny udp src outside:166.70.136.115/18386 dst dmz-1:226.179.215.66/53 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 53, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 18 2022 12:19:45: %ASA-4-106023: Deny udp src outside:166.70.136.115/18386 dst dmz-1:226.179.215.66/53 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 18386, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "166.70.136.115", "serverIP": "226.179.215.66" }
Create a JSON artifact from the message
<164>Sep 18 2022 12:19:45: %ASA-4-106023: Deny udp src outside:166.70.136.115/18386 dst dmz-1:226.179.215.66/53 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 18 2022 12:19:45: %ASA-4-106023: Deny udp src outside:166.70.136.115/18386 dst dmz-1:226.179.215.66/53 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 53 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 18386 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 166.70.136.115 serverIP: 226.179.215.66
Explain this syslog message
<164>Sep 18 2022 12:19:45: %ASA-4-106023: Deny udp src outside:27.225.43.156/18386 dst dmz-1:230.171.127.205/53 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 53, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", "message": "<164>Sep 18 2022 12:19:45: %ASA-4-106023: Deny udp src outside:27.225.43.156/18386 dst dmz-1:230.171.127.205/53 by access-group \"outside_access_in\" [0x0, 0x0]\n", "sensitivity": "normal", "facilitylabel": "local4", "messagetype": "firewall_action", "clientport": 18386, "vendorcode": "ASA-4-106023", "action": "block", "protocol": 17, "facilitycode": 20, "streamName": "cisco_asa", "clientIP": "27.225.43.156", "serverIP": "230.171.127.205" }
Create a JSON artifact from the message
<164>Sep 18 2022 12:19:45: %ASA-4-106023: Deny udp src outside:27.225.43.156/18386 dst dmz-1:230.171.127.205/53 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 18 2022 12:19:45: %ASA-4-106023: Deny udp src outside:27.225.43.156/18386 dst dmz-1:230.171.127.205/53 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 53 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown sensitivity: normal facilitylabel: local4 messagetype: firewall_action clientport: 18386 vendorcode: ASA-4-106023 action: block protocol: 17 facilitycode: 20 streamName: cisco_asa clientIP: 27.225.43.156 serverIP: 230.171.127.205
Explain this syslog message
<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=67.144.221.210 dst=115.117.69.79 protocol=tcp sport=58113 dport=25 pattern: 1 dst 115.117.69.79
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=67.144.221.210 dst=115.117.69.79 protocol=tcp sport=58113 dport=25 pattern: 1 dst 115.117.69.79", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 58113, "protocol": 6, "streamName": "meraki", "clientIP": "67.144.221.210", "serverIP": "115.117.69.79" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=67.144.221.210 dst=115.117.69.79 protocol=tcp sport=58113 dport=25 pattern: 1 dst 115.117.69.79
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=67.144.221.210 dst=115.117.69.79 protocol=tcp sport=58113 dport=25 pattern: 1 dst 115.117.69.79
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 58113 protocol: 6 streamName: meraki clientIP: 67.144.221.210 serverIP: 115.117.69.79
Explain this syslog message
<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=188.133.43.197 dst=105.35.245.90 protocol=tcp sport=58113 dport=25 pattern: 1 dst 105.35.245.90
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=188.133.43.197 dst=105.35.245.90 protocol=tcp sport=58113 dport=25 pattern: 1 dst 105.35.245.90", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 58113, "protocol": 6, "streamName": "meraki", "clientIP": "188.133.43.197", "serverIP": "105.35.245.90" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=188.133.43.197 dst=105.35.245.90 protocol=tcp sport=58113 dport=25 pattern: 1 dst 105.35.245.90
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=188.133.43.197 dst=105.35.245.90 protocol=tcp sport=58113 dport=25 pattern: 1 dst 105.35.245.90
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 58113 protocol: 6 streamName: meraki clientIP: 188.133.43.197 serverIP: 105.35.245.90
Explain this syslog message
<134>Original Address=192.168.2.253 1 1663633277.233652463 NORDC_MX400_1 flows src=204.236.124.97 dst=5.7.3.163 protocol=tcp sport=6192 dport=25 pattern: 1 dst 5.7.3.163
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1663633277.233652463 NORDC_MX400_1 flows src=204.236.124.97 dst=5.7.3.163 protocol=tcp sport=6192 dport=25 pattern: 1 dst 5.7.3.163", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 6192, "protocol": 6, "streamName": "meraki", "clientIP": "204.236.124.97", "serverIP": "5.7.3.163" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1663633277.233652463 NORDC_MX400_1 flows src=204.236.124.97 dst=5.7.3.163 protocol=tcp sport=6192 dport=25 pattern: 1 dst 5.7.3.163
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1663633277.233652463 NORDC_MX400_1 flows src=204.236.124.97 dst=5.7.3.163 protocol=tcp sport=6192 dport=25 pattern: 1 dst 5.7.3.163
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 6192 protocol: 6 streamName: meraki clientIP: 204.236.124.97 serverIP: 5.7.3.163
Explain this syslog message
<134>Original Address=192.168.2.253 1 1663633277.233652463 NORDC_MX400_1 flows src=161.48.130.216 dst=73.27.171.219 protocol=tcp sport=6192 dport=25 pattern: 1 dst 73.27.171.219
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1663633277.233652463 NORDC_MX400_1 flows src=161.48.130.216 dst=73.27.171.219 protocol=tcp sport=6192 dport=25 pattern: 1 dst 73.27.171.219", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 6192, "protocol": 6, "streamName": "meraki", "clientIP": "161.48.130.216", "serverIP": "73.27.171.219" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1663633277.233652463 NORDC_MX400_1 flows src=161.48.130.216 dst=73.27.171.219 protocol=tcp sport=6192 dport=25 pattern: 1 dst 73.27.171.219
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1663633277.233652463 NORDC_MX400_1 flows src=161.48.130.216 dst=73.27.171.219 protocol=tcp sport=6192 dport=25 pattern: 1 dst 73.27.171.219
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 6192 protocol: 6 streamName: meraki clientIP: 161.48.130.216 serverIP: 73.27.171.219
Explain this syslog message
<134>Original Address=192.168.2.253 1 1663633277.226192129 NORDC_MX400_1 flows src=197.52.22.13 dst=115.143.165.155 protocol=tcp sport=15378 dport=25 pattern: 1 dst 115.143.165.155
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1663633277.226192129 NORDC_MX400_1 flows src=197.52.22.13 dst=115.143.165.155 protocol=tcp sport=15378 dport=25 pattern: 1 dst 115.143.165.155", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 15378, "protocol": 6, "streamName": "meraki", "clientIP": "197.52.22.13", "serverIP": "115.143.165.155" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1663633277.226192129 NORDC_MX400_1 flows src=197.52.22.13 dst=115.143.165.155 protocol=tcp sport=15378 dport=25 pattern: 1 dst 115.143.165.155
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1663633277.226192129 NORDC_MX400_1 flows src=197.52.22.13 dst=115.143.165.155 protocol=tcp sport=15378 dport=25 pattern: 1 dst 115.143.165.155
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 15378 protocol: 6 streamName: meraki clientIP: 197.52.22.13 serverIP: 115.143.165.155
Explain this syslog message
<134>Original Address=192.168.2.253 1 1663633277.226192129 NORDC_MX400_1 flows src=125.236.75.208 dst=58.47.26.79 protocol=tcp sport=15378 dport=25 pattern: 1 dst 58.47.26.79
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1663633277.226192129 NORDC_MX400_1 flows src=125.236.75.208 dst=58.47.26.79 protocol=tcp sport=15378 dport=25 pattern: 1 dst 58.47.26.79", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 15378, "protocol": 6, "streamName": "meraki", "clientIP": "125.236.75.208", "serverIP": "58.47.26.79" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1663633277.226192129 NORDC_MX400_1 flows src=125.236.75.208 dst=58.47.26.79 protocol=tcp sport=15378 dport=25 pattern: 1 dst 58.47.26.79
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1663633277.226192129 NORDC_MX400_1 flows src=125.236.75.208 dst=58.47.26.79 protocol=tcp sport=15378 dport=25 pattern: 1 dst 58.47.26.79
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 15378 protocol: 6 streamName: meraki clientIP: 125.236.75.208 serverIP: 58.47.26.79
Explain this syslog message
<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=186.66.111.132 dst=10.205.135.5 protocol=tcp sport=58113 dport=25 pattern: 1 dst 10.205.135.5
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=186.66.111.132 dst=10.205.135.5 protocol=tcp sport=58113 dport=25 pattern: 1 dst 10.205.135.5", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 58113, "protocol": 6, "streamName": "meraki", "clientIP": "186.66.111.132", "serverIP": "10.205.135.5" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=186.66.111.132 dst=10.205.135.5 protocol=tcp sport=58113 dport=25 pattern: 1 dst 10.205.135.5
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=186.66.111.132 dst=10.205.135.5 protocol=tcp sport=58113 dport=25 pattern: 1 dst 10.205.135.5
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 58113 protocol: 6 streamName: meraki clientIP: 186.66.111.132 serverIP: 10.205.135.5
Explain this syslog message
<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=35.87.238.118 dst=211.237.36.242 protocol=tcp sport=58113 dport=25 pattern: 1 dst 211.237.36.242
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=35.87.238.118 dst=211.237.36.242 protocol=tcp sport=58113 dport=25 pattern: 1 dst 211.237.36.242", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 58113, "protocol": 6, "streamName": "meraki", "clientIP": "35.87.238.118", "serverIP": "211.237.36.242" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=35.87.238.118 dst=211.237.36.242 protocol=tcp sport=58113 dport=25 pattern: 1 dst 211.237.36.242
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=35.87.238.118 dst=211.237.36.242 protocol=tcp sport=58113 dport=25 pattern: 1 dst 211.237.36.242
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 58113 protocol: 6 streamName: meraki clientIP: 35.87.238.118 serverIP: 211.237.36.242
Explain this syslog message
<134>Original Address=192.168.2.253 1 1663633277.389541881 NORDC_MX400_1 flows src=173.200.237.219 dst=169.126.210.177 protocol=tcp sport=37994 dport=25 pattern: 1 dst 169.126.210.177
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1663633277.389541881 NORDC_MX400_1 flows src=173.200.237.219 dst=169.126.210.177 protocol=tcp sport=37994 dport=25 pattern: 1 dst 169.126.210.177", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 37994, "protocol": 6, "streamName": "meraki", "clientIP": "173.200.237.219", "serverIP": "169.126.210.177" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1663633277.389541881 NORDC_MX400_1 flows src=173.200.237.219 dst=169.126.210.177 protocol=tcp sport=37994 dport=25 pattern: 1 dst 169.126.210.177
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1663633277.389541881 NORDC_MX400_1 flows src=173.200.237.219 dst=169.126.210.177 protocol=tcp sport=37994 dport=25 pattern: 1 dst 169.126.210.177
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 37994 protocol: 6 streamName: meraki clientIP: 173.200.237.219 serverIP: 169.126.210.177
Explain this syslog message
<134>Original Address=192.168.2.253 1 1663633277.389541881 NORDC_MX400_1 flows src=120.155.35.249 dst=152.49.210.21 protocol=tcp sport=37994 dport=25 pattern: 1 dst 152.49.210.21
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1663633277.389541881 NORDC_MX400_1 flows src=120.155.35.249 dst=152.49.210.21 protocol=tcp sport=37994 dport=25 pattern: 1 dst 152.49.210.21", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 37994, "protocol": 6, "streamName": "meraki", "clientIP": "120.155.35.249", "serverIP": "152.49.210.21" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1663633277.389541881 NORDC_MX400_1 flows src=120.155.35.249 dst=152.49.210.21 protocol=tcp sport=37994 dport=25 pattern: 1 dst 152.49.210.21
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1663633277.389541881 NORDC_MX400_1 flows src=120.155.35.249 dst=152.49.210.21 protocol=tcp sport=37994 dport=25 pattern: 1 dst 152.49.210.21
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 37994 protocol: 6 streamName: meraki clientIP: 120.155.35.249 serverIP: 152.49.210.21
Explain this syslog message
<134>Original Address=192.168.2.253 1 1663633277.776776630 NORDC_MX400_1 flows src=12.161.240.106 dst=142.185.210.226 protocol=tcp sport=9068 dport=25 pattern: 1 dst 142.185.210.226
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1663633277.776776630 NORDC_MX400_1 flows src=12.161.240.106 dst=142.185.210.226 protocol=tcp sport=9068 dport=25 pattern: 1 dst 142.185.210.226", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 9068, "protocol": 6, "streamName": "meraki", "clientIP": "12.161.240.106", "serverIP": "142.185.210.226" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1663633277.776776630 NORDC_MX400_1 flows src=12.161.240.106 dst=142.185.210.226 protocol=tcp sport=9068 dport=25 pattern: 1 dst 142.185.210.226
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1663633277.776776630 NORDC_MX400_1 flows src=12.161.240.106 dst=142.185.210.226 protocol=tcp sport=9068 dport=25 pattern: 1 dst 142.185.210.226
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 9068 protocol: 6 streamName: meraki clientIP: 12.161.240.106 serverIP: 142.185.210.226
Explain this syslog message
<134>Original Address=192.168.2.253 1 1663633277.776776630 NORDC_MX400_1 flows src=33.44.133.201 dst=51.195.121.122 protocol=tcp sport=9068 dport=25 pattern: 1 dst 51.195.121.122
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1663633277.776776630 NORDC_MX400_1 flows src=33.44.133.201 dst=51.195.121.122 protocol=tcp sport=9068 dport=25 pattern: 1 dst 51.195.121.122", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 9068, "protocol": 6, "streamName": "meraki", "clientIP": "33.44.133.201", "serverIP": "51.195.121.122" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1663633277.776776630 NORDC_MX400_1 flows src=33.44.133.201 dst=51.195.121.122 protocol=tcp sport=9068 dport=25 pattern: 1 dst 51.195.121.122
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1663633277.776776630 NORDC_MX400_1 flows src=33.44.133.201 dst=51.195.121.122 protocol=tcp sport=9068 dport=25 pattern: 1 dst 51.195.121.122
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 9068 protocol: 6 streamName: meraki clientIP: 33.44.133.201 serverIP: 51.195.121.122
Explain this syslog message
<134>Original Address=192.168.2.253 1 1663633277.808467158 NORDC_MX400_1 flows src=160.151.210.101 dst=91.20.18.255 protocol=tcp sport=6182 dport=25 pattern: 1 dst 91.20.18.255
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1663633277.808467158 NORDC_MX400_1 flows src=160.151.210.101 dst=91.20.18.255 protocol=tcp sport=6182 dport=25 pattern: 1 dst 91.20.18.255", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 6182, "protocol": 6, "streamName": "meraki", "clientIP": "160.151.210.101", "serverIP": "91.20.18.255" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1663633277.808467158 NORDC_MX400_1 flows src=160.151.210.101 dst=91.20.18.255 protocol=tcp sport=6182 dport=25 pattern: 1 dst 91.20.18.255
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1663633277.808467158 NORDC_MX400_1 flows src=160.151.210.101 dst=91.20.18.255 protocol=tcp sport=6182 dport=25 pattern: 1 dst 91.20.18.255
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 6182 protocol: 6 streamName: meraki clientIP: 160.151.210.101 serverIP: 91.20.18.255
Explain this syslog message
<134>Original Address=192.168.2.253 1 1663633277.808467158 NORDC_MX400_1 flows src=148.147.244.78 dst=190.141.16.201 protocol=tcp sport=6182 dport=25 pattern: 1 dst 190.141.16.201
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1663633277.808467158 NORDC_MX400_1 flows src=148.147.244.78 dst=190.141.16.201 protocol=tcp sport=6182 dport=25 pattern: 1 dst 190.141.16.201", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 6182, "protocol": 6, "streamName": "meraki", "clientIP": "148.147.244.78", "serverIP": "190.141.16.201" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1663633277.808467158 NORDC_MX400_1 flows src=148.147.244.78 dst=190.141.16.201 protocol=tcp sport=6182 dport=25 pattern: 1 dst 190.141.16.201
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1663633277.808467158 NORDC_MX400_1 flows src=148.147.244.78 dst=190.141.16.201 protocol=tcp sport=6182 dport=25 pattern: 1 dst 190.141.16.201
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 6182 protocol: 6 streamName: meraki clientIP: 148.147.244.78 serverIP: 190.141.16.201
Explain this syslog message
<134>Original Address=192.168.2.253 1 1663633277.301569088 NORDC_MX400_1 flows src=95.220.97.181 dst=27.193.6.191 protocol=tcp sport=6175 dport=25 pattern: 1 dst 27.193.6.191
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1663633277.301569088 NORDC_MX400_1 flows src=95.220.97.181 dst=27.193.6.191 protocol=tcp sport=6175 dport=25 pattern: 1 dst 27.193.6.191", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 6175, "protocol": 6, "streamName": "meraki", "clientIP": "95.220.97.181", "serverIP": "27.193.6.191" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1663633277.301569088 NORDC_MX400_1 flows src=95.220.97.181 dst=27.193.6.191 protocol=tcp sport=6175 dport=25 pattern: 1 dst 27.193.6.191
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1663633277.301569088 NORDC_MX400_1 flows src=95.220.97.181 dst=27.193.6.191 protocol=tcp sport=6175 dport=25 pattern: 1 dst 27.193.6.191
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 6175 protocol: 6 streamName: meraki clientIP: 95.220.97.181 serverIP: 27.193.6.191
Explain this syslog message
<134>Original Address=192.168.2.253 1 1663633277.301569088 NORDC_MX400_1 flows src=20.182.64.231 dst=229.181.176.221 protocol=tcp sport=6175 dport=25 pattern: 1 dst 229.181.176.221
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1663633277.301569088 NORDC_MX400_1 flows src=20.182.64.231 dst=229.181.176.221 protocol=tcp sport=6175 dport=25 pattern: 1 dst 229.181.176.221", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 6175, "protocol": 6, "streamName": "meraki", "clientIP": "20.182.64.231", "serverIP": "229.181.176.221" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1663633277.301569088 NORDC_MX400_1 flows src=20.182.64.231 dst=229.181.176.221 protocol=tcp sport=6175 dport=25 pattern: 1 dst 229.181.176.221
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1663633277.301569088 NORDC_MX400_1 flows src=20.182.64.231 dst=229.181.176.221 protocol=tcp sport=6175 dport=25 pattern: 1 dst 229.181.176.221
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 6175 protocol: 6 streamName: meraki clientIP: 20.182.64.231 serverIP: 229.181.176.221
Explain this syslog message
<134>Original Address=192.168.2.253 1 1663633277.309734870 NORDC_MX400_1 flows src=111.223.182.25 dst=241.147.84.10 protocol=tcp sport=22528 dport=25 pattern: 1 dst 241.147.84.10
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1663633277.309734870 NORDC_MX400_1 flows src=111.223.182.25 dst=241.147.84.10 protocol=tcp sport=22528 dport=25 pattern: 1 dst 241.147.84.10", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 22528, "protocol": 6, "streamName": "meraki", "clientIP": "111.223.182.25", "serverIP": "241.147.84.10" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1663633277.309734870 NORDC_MX400_1 flows src=111.223.182.25 dst=241.147.84.10 protocol=tcp sport=22528 dport=25 pattern: 1 dst 241.147.84.10
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1663633277.309734870 NORDC_MX400_1 flows src=111.223.182.25 dst=241.147.84.10 protocol=tcp sport=22528 dport=25 pattern: 1 dst 241.147.84.10
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 22528 protocol: 6 streamName: meraki clientIP: 111.223.182.25 serverIP: 241.147.84.10
Explain this syslog message
<134>Original Address=192.168.2.253 1 1663633277.309734870 NORDC_MX400_1 flows src=192.160.220.199 dst=122.73.64.19 protocol=tcp sport=22528 dport=25 pattern: 1 dst 122.73.64.19
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1663633277.309734870 NORDC_MX400_1 flows src=192.160.220.199 dst=122.73.64.19 protocol=tcp sport=22528 dport=25 pattern: 1 dst 122.73.64.19", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 22528, "protocol": 6, "streamName": "meraki", "clientIP": "192.160.220.199", "serverIP": "122.73.64.19" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1663633277.309734870 NORDC_MX400_1 flows src=192.160.220.199 dst=122.73.64.19 protocol=tcp sport=22528 dport=25 pattern: 1 dst 122.73.64.19
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1663633277.309734870 NORDC_MX400_1 flows src=192.160.220.199 dst=122.73.64.19 protocol=tcp sport=22528 dport=25 pattern: 1 dst 122.73.64.19
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 22528 protocol: 6 streamName: meraki clientIP: 192.160.220.199 serverIP: 122.73.64.19
Explain this syslog message
<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=251.238.62.175 dst=175.67.111.116 protocol=tcp sport=13079 dport=902 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 902, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=251.238.62.175 dst=175.67.111.116 protocol=tcp sport=13079 dport=902 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 13079, "protocol": 6, "streamName": "meraki", "clientIP": "251.238.62.175", "serverIP": "175.67.111.116" }
Create a JSON artifact from the message
<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=251.238.62.175 dst=175.67.111.116 protocol=tcp sport=13079 dport=902 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=251.238.62.175 dst=175.67.111.116 protocol=tcp sport=13079 dport=902 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 902 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 13079 protocol: 6 streamName: meraki clientIP: 251.238.62.175 serverIP: 175.67.111.116
Explain this syslog message
<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=74.234.9.122 dst=12.179.142.220 protocol=tcp sport=13079 dport=902 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 902, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=74.234.9.122 dst=12.179.142.220 protocol=tcp sport=13079 dport=902 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 13079, "protocol": 6, "streamName": "meraki", "clientIP": "74.234.9.122", "serverIP": "12.179.142.220" }
Create a JSON artifact from the message
<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=74.234.9.122 dst=12.179.142.220 protocol=tcp sport=13079 dport=902 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=74.234.9.122 dst=12.179.142.220 protocol=tcp sport=13079 dport=902 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 902 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 13079 protocol: 6 streamName: meraki clientIP: 74.234.9.122 serverIP: 12.179.142.220
Explain this syslog message
<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=77.146.177.107 dst=179.109.118.168 protocol=tcp sport=13079 dport=902 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 902, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=77.146.177.107 dst=179.109.118.168 protocol=tcp sport=13079 dport=902 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 13079, "protocol": 6, "streamName": "meraki", "clientIP": "77.146.177.107", "serverIP": "179.109.118.168" }
Create a JSON artifact from the message
<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=77.146.177.107 dst=179.109.118.168 protocol=tcp sport=13079 dport=902 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=77.146.177.107 dst=179.109.118.168 protocol=tcp sport=13079 dport=902 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 902 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 13079 protocol: 6 streamName: meraki clientIP: 77.146.177.107 serverIP: 179.109.118.168
Explain this syslog message
<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=98.174.192.12 dst=241.98.50.107 protocol=tcp sport=13079 dport=902 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 902, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=98.174.192.12 dst=241.98.50.107 protocol=tcp sport=13079 dport=902 pattern: 1 all", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 13079, "protocol": 6, "streamName": "meraki", "clientIP": "98.174.192.12", "serverIP": "241.98.50.107" }
Create a JSON artifact from the message
<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=98.174.192.12 dst=241.98.50.107 protocol=tcp sport=13079 dport=902 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=98.174.192.12 dst=241.98.50.107 protocol=tcp sport=13079 dport=902 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 902 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 13079 protocol: 6 streamName: meraki clientIP: 98.174.192.12 serverIP: 241.98.50.107
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658389062.666821676 NORDC_MX400_1 flows src=20.75.219.88 dst=34.107.220.87 protocol=tcp sport=47104 dport=25 pattern: 1 dst 34.107.220.87
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658389062.666821676 NORDC_MX400_1 flows src=20.75.219.88 dst=34.107.220.87 protocol=tcp sport=47104 dport=25 pattern: 1 dst 34.107.220.87", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 47104, "protocol": 6, "streamName": "meraki", "clientIP": "20.75.219.88", "serverIP": "34.107.220.87" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658389062.666821676 NORDC_MX400_1 flows src=20.75.219.88 dst=34.107.220.87 protocol=tcp sport=47104 dport=25 pattern: 1 dst 34.107.220.87
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658389062.666821676 NORDC_MX400_1 flows src=20.75.219.88 dst=34.107.220.87 protocol=tcp sport=47104 dport=25 pattern: 1 dst 34.107.220.87
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 47104 protocol: 6 streamName: meraki clientIP: 20.75.219.88 serverIP: 34.107.220.87
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658389062.666821676 NORDC_MX400_1 flows src=116.0.227.6 dst=33.33.173.49 protocol=tcp sport=47104 dport=25 pattern: 1 dst 33.33.173.49
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658389062.666821676 NORDC_MX400_1 flows src=116.0.227.6 dst=33.33.173.49 protocol=tcp sport=47104 dport=25 pattern: 1 dst 33.33.173.49", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 47104, "protocol": 6, "streamName": "meraki", "clientIP": "116.0.227.6", "serverIP": "33.33.173.49" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658389062.666821676 NORDC_MX400_1 flows src=116.0.227.6 dst=33.33.173.49 protocol=tcp sport=47104 dport=25 pattern: 1 dst 33.33.173.49
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658389062.666821676 NORDC_MX400_1 flows src=116.0.227.6 dst=33.33.173.49 protocol=tcp sport=47104 dport=25 pattern: 1 dst 33.33.173.49
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 47104 protocol: 6 streamName: meraki clientIP: 116.0.227.6 serverIP: 33.33.173.49
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658389061.876971670 NORDC_MX400_1 flows src=58.12.126.33 dst=122.19.215.105 protocol=tcp sport=20807 dport=25 pattern: 1 dst 122.19.215.105
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658389061.876971670 NORDC_MX400_1 flows src=58.12.126.33 dst=122.19.215.105 protocol=tcp sport=20807 dport=25 pattern: 1 dst 122.19.215.105", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 20807, "protocol": 6, "streamName": "meraki", "clientIP": "58.12.126.33", "serverIP": "122.19.215.105" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658389061.876971670 NORDC_MX400_1 flows src=58.12.126.33 dst=122.19.215.105 protocol=tcp sport=20807 dport=25 pattern: 1 dst 122.19.215.105
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658389061.876971670 NORDC_MX400_1 flows src=58.12.126.33 dst=122.19.215.105 protocol=tcp sport=20807 dport=25 pattern: 1 dst 122.19.215.105
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 20807 protocol: 6 streamName: meraki clientIP: 58.12.126.33 serverIP: 122.19.215.105
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658389061.876971670 NORDC_MX400_1 flows src=208.221.40.81 dst=17.197.187.90 protocol=tcp sport=20807 dport=25 pattern: 1 dst 17.197.187.90
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658389061.876971670 NORDC_MX400_1 flows src=208.221.40.81 dst=17.197.187.90 protocol=tcp sport=20807 dport=25 pattern: 1 dst 17.197.187.90", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 20807, "protocol": 6, "streamName": "meraki", "clientIP": "208.221.40.81", "serverIP": "17.197.187.90" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658389061.876971670 NORDC_MX400_1 flows src=208.221.40.81 dst=17.197.187.90 protocol=tcp sport=20807 dport=25 pattern: 1 dst 17.197.187.90
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658389061.876971670 NORDC_MX400_1 flows src=208.221.40.81 dst=17.197.187.90 protocol=tcp sport=20807 dport=25 pattern: 1 dst 17.197.187.90
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 20807 protocol: 6 streamName: meraki clientIP: 208.221.40.81 serverIP: 17.197.187.90
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658389062.540627277 NORDC_MX400_1 flows src=180.15.146.141 dst=198.162.20.103 protocol=tcp sport=57271 dport=25 pattern: 1 dst 198.162.20.103
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658389062.540627277 NORDC_MX400_1 flows src=180.15.146.141 dst=198.162.20.103 protocol=tcp sport=57271 dport=25 pattern: 1 dst 198.162.20.103", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 57271, "protocol": 6, "streamName": "meraki", "clientIP": "180.15.146.141", "serverIP": "198.162.20.103" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658389062.540627277 NORDC_MX400_1 flows src=180.15.146.141 dst=198.162.20.103 protocol=tcp sport=57271 dport=25 pattern: 1 dst 198.162.20.103
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658389062.540627277 NORDC_MX400_1 flows src=180.15.146.141 dst=198.162.20.103 protocol=tcp sport=57271 dport=25 pattern: 1 dst 198.162.20.103
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 57271 protocol: 6 streamName: meraki clientIP: 180.15.146.141 serverIP: 198.162.20.103
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658389062.540627277 NORDC_MX400_1 flows src=170.96.220.53 dst=31.31.245.130 protocol=tcp sport=57271 dport=25 pattern: 1 dst 31.31.245.130
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658389062.540627277 NORDC_MX400_1 flows src=170.96.220.53 dst=31.31.245.130 protocol=tcp sport=57271 dport=25 pattern: 1 dst 31.31.245.130", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 57271, "protocol": 6, "streamName": "meraki", "clientIP": "170.96.220.53", "serverIP": "31.31.245.130" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658389062.540627277 NORDC_MX400_1 flows src=170.96.220.53 dst=31.31.245.130 protocol=tcp sport=57271 dport=25 pattern: 1 dst 31.31.245.130
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658389062.540627277 NORDC_MX400_1 flows src=170.96.220.53 dst=31.31.245.130 protocol=tcp sport=57271 dport=25 pattern: 1 dst 31.31.245.130
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 57271 protocol: 6 streamName: meraki clientIP: 170.96.220.53 serverIP: 31.31.245.130
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658389062.578624528 NORDC_MX400_1 flows src=204.129.0.121 dst=142.1.152.59 protocol=tcp sport=58721 dport=25 pattern: 1 dst 142.1.152.59
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658389062.578624528 NORDC_MX400_1 flows src=204.129.0.121 dst=142.1.152.59 protocol=tcp sport=58721 dport=25 pattern: 1 dst 142.1.152.59", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 58721, "protocol": 6, "streamName": "meraki", "clientIP": "204.129.0.121", "serverIP": "142.1.152.59" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658389062.578624528 NORDC_MX400_1 flows src=204.129.0.121 dst=142.1.152.59 protocol=tcp sport=58721 dport=25 pattern: 1 dst 142.1.152.59
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658389062.578624528 NORDC_MX400_1 flows src=204.129.0.121 dst=142.1.152.59 protocol=tcp sport=58721 dport=25 pattern: 1 dst 142.1.152.59
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 58721 protocol: 6 streamName: meraki clientIP: 204.129.0.121 serverIP: 142.1.152.59
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658389062.578624528 NORDC_MX400_1 flows src=76.68.182.160 dst=157.155.131.186 protocol=tcp sport=58721 dport=25 pattern: 1 dst 157.155.131.186
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658389062.578624528 NORDC_MX400_1 flows src=76.68.182.160 dst=157.155.131.186 protocol=tcp sport=58721 dport=25 pattern: 1 dst 157.155.131.186", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 58721, "protocol": 6, "streamName": "meraki", "clientIP": "76.68.182.160", "serverIP": "157.155.131.186" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658389062.578624528 NORDC_MX400_1 flows src=76.68.182.160 dst=157.155.131.186 protocol=tcp sport=58721 dport=25 pattern: 1 dst 157.155.131.186
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658389062.578624528 NORDC_MX400_1 flows src=76.68.182.160 dst=157.155.131.186 protocol=tcp sport=58721 dport=25 pattern: 1 dst 157.155.131.186
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 58721 protocol: 6 streamName: meraki clientIP: 76.68.182.160 serverIP: 157.155.131.186
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658389062.593258665 NORDC_MX400_1 flows src=54.56.223.38 dst=130.9.189.44 protocol=tcp sport=41315 dport=25 pattern: 1 dst 130.9.189.44
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658389062.593258665 NORDC_MX400_1 flows src=54.56.223.38 dst=130.9.189.44 protocol=tcp sport=41315 dport=25 pattern: 1 dst 130.9.189.44", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 41315, "protocol": 6, "streamName": "meraki", "clientIP": "54.56.223.38", "serverIP": "130.9.189.44" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658389062.593258665 NORDC_MX400_1 flows src=54.56.223.38 dst=130.9.189.44 protocol=tcp sport=41315 dport=25 pattern: 1 dst 130.9.189.44
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658389062.593258665 NORDC_MX400_1 flows src=54.56.223.38 dst=130.9.189.44 protocol=tcp sport=41315 dport=25 pattern: 1 dst 130.9.189.44
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 41315 protocol: 6 streamName: meraki clientIP: 54.56.223.38 serverIP: 130.9.189.44
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658389062.593258665 NORDC_MX400_1 flows src=45.134.53.224 dst=230.209.212.226 protocol=tcp sport=41315 dport=25 pattern: 1 dst 230.209.212.226
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658389062.593258665 NORDC_MX400_1 flows src=45.134.53.224 dst=230.209.212.226 protocol=tcp sport=41315 dport=25 pattern: 1 dst 230.209.212.226", "action": "block", "sensitivity": "normal", "messagetype": "flow", "clientport": 41315, "protocol": 6, "streamName": "meraki", "clientIP": "45.134.53.224", "serverIP": "230.209.212.226" }
Create a JSON artifact from the message