input_text
stringlengths 52
64.8k
| output_text
stringlengths 23
66k
| instruction
stringclasses 3
values |
---|---|---|
<164>Sep 18 2022 12:19:45: %ASA-4-106023: Deny udp src outside:166.70.136.115/18386 dst dmz-1:226.179.215.66/53 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 53,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 18 2022 12:19:45: %ASA-4-106023: Deny udp src outside:166.70.136.115/18386 dst dmz-1:226.179.215.66/53 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 18386,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "166.70.136.115",
"serverIP": "226.179.215.66"
} | Create a JSON artifact from the message |
<164>Sep 18 2022 12:19:45: %ASA-4-106023: Deny udp src outside:166.70.136.115/18386 dst dmz-1:226.179.215.66/53 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 18 2022 12:19:45: %ASA-4-106023: Deny udp src outside:166.70.136.115/18386 dst dmz-1:226.179.215.66/53 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 53
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 18386
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 166.70.136.115
serverIP: 226.179.215.66 | Explain this syslog message |
<164>Sep 18 2022 12:19:45: %ASA-4-106023: Deny udp src outside:27.225.43.156/18386 dst dmz-1:230.171.127.205/53 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 53,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<164>Sep 18 2022 12:19:45: %ASA-4-106023: Deny udp src outside:27.225.43.156/18386 dst dmz-1:230.171.127.205/53 by access-group \"outside_access_in\" [0x0, 0x0]\n",
"sensitivity": "normal",
"facilitylabel": "local4",
"messagetype": "firewall_action",
"clientport": 18386,
"vendorcode": "ASA-4-106023",
"action": "block",
"protocol": 17,
"facilitycode": 20,
"streamName": "cisco_asa",
"clientIP": "27.225.43.156",
"serverIP": "230.171.127.205"
} | Create a JSON artifact from the message |
<164>Sep 18 2022 12:19:45: %ASA-4-106023: Deny udp src outside:27.225.43.156/18386 dst dmz-1:230.171.127.205/53 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 18 2022 12:19:45: %ASA-4-106023: Deny udp src outside:27.225.43.156/18386 dst dmz-1:230.171.127.205/53 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 53
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: normal
facilitylabel: local4
messagetype: firewall_action
clientport: 18386
vendorcode: ASA-4-106023
action: block
protocol: 17
facilitycode: 20
streamName: cisco_asa
clientIP: 27.225.43.156
serverIP: 230.171.127.205 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=67.144.221.210 dst=115.117.69.79 protocol=tcp sport=58113 dport=25 pattern: 1 dst 115.117.69.79 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=67.144.221.210 dst=115.117.69.79 protocol=tcp sport=58113 dport=25 pattern: 1 dst 115.117.69.79",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 58113,
"protocol": 6,
"streamName": "meraki",
"clientIP": "67.144.221.210",
"serverIP": "115.117.69.79"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=67.144.221.210 dst=115.117.69.79 protocol=tcp sport=58113 dport=25 pattern: 1 dst 115.117.69.79 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=67.144.221.210 dst=115.117.69.79 protocol=tcp sport=58113 dport=25 pattern: 1 dst 115.117.69.79 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 58113
protocol: 6
streamName: meraki
clientIP: 67.144.221.210
serverIP: 115.117.69.79 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=188.133.43.197 dst=105.35.245.90 protocol=tcp sport=58113 dport=25 pattern: 1 dst 105.35.245.90 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=188.133.43.197 dst=105.35.245.90 protocol=tcp sport=58113 dport=25 pattern: 1 dst 105.35.245.90",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 58113,
"protocol": 6,
"streamName": "meraki",
"clientIP": "188.133.43.197",
"serverIP": "105.35.245.90"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=188.133.43.197 dst=105.35.245.90 protocol=tcp sport=58113 dport=25 pattern: 1 dst 105.35.245.90 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=188.133.43.197 dst=105.35.245.90 protocol=tcp sport=58113 dport=25 pattern: 1 dst 105.35.245.90 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 58113
protocol: 6
streamName: meraki
clientIP: 188.133.43.197
serverIP: 105.35.245.90 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.233652463 NORDC_MX400_1 flows src=204.236.124.97 dst=5.7.3.163 protocol=tcp sport=6192 dport=25 pattern: 1 dst 5.7.3.163 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1663633277.233652463 NORDC_MX400_1 flows src=204.236.124.97 dst=5.7.3.163 protocol=tcp sport=6192 dport=25 pattern: 1 dst 5.7.3.163",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6192,
"protocol": 6,
"streamName": "meraki",
"clientIP": "204.236.124.97",
"serverIP": "5.7.3.163"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1663633277.233652463 NORDC_MX400_1 flows src=204.236.124.97 dst=5.7.3.163 protocol=tcp sport=6192 dport=25 pattern: 1 dst 5.7.3.163 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.233652463 NORDC_MX400_1 flows src=204.236.124.97 dst=5.7.3.163 protocol=tcp sport=6192 dport=25 pattern: 1 dst 5.7.3.163 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6192
protocol: 6
streamName: meraki
clientIP: 204.236.124.97
serverIP: 5.7.3.163 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.233652463 NORDC_MX400_1 flows src=161.48.130.216 dst=73.27.171.219 protocol=tcp sport=6192 dport=25 pattern: 1 dst 73.27.171.219 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1663633277.233652463 NORDC_MX400_1 flows src=161.48.130.216 dst=73.27.171.219 protocol=tcp sport=6192 dport=25 pattern: 1 dst 73.27.171.219",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6192,
"protocol": 6,
"streamName": "meraki",
"clientIP": "161.48.130.216",
"serverIP": "73.27.171.219"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1663633277.233652463 NORDC_MX400_1 flows src=161.48.130.216 dst=73.27.171.219 protocol=tcp sport=6192 dport=25 pattern: 1 dst 73.27.171.219 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.233652463 NORDC_MX400_1 flows src=161.48.130.216 dst=73.27.171.219 protocol=tcp sport=6192 dport=25 pattern: 1 dst 73.27.171.219 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6192
protocol: 6
streamName: meraki
clientIP: 161.48.130.216
serverIP: 73.27.171.219 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.226192129 NORDC_MX400_1 flows src=197.52.22.13 dst=115.143.165.155 protocol=tcp sport=15378 dport=25 pattern: 1 dst 115.143.165.155 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1663633277.226192129 NORDC_MX400_1 flows src=197.52.22.13 dst=115.143.165.155 protocol=tcp sport=15378 dport=25 pattern: 1 dst 115.143.165.155",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 15378,
"protocol": 6,
"streamName": "meraki",
"clientIP": "197.52.22.13",
"serverIP": "115.143.165.155"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1663633277.226192129 NORDC_MX400_1 flows src=197.52.22.13 dst=115.143.165.155 protocol=tcp sport=15378 dport=25 pattern: 1 dst 115.143.165.155 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.226192129 NORDC_MX400_1 flows src=197.52.22.13 dst=115.143.165.155 protocol=tcp sport=15378 dport=25 pattern: 1 dst 115.143.165.155 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 15378
protocol: 6
streamName: meraki
clientIP: 197.52.22.13
serverIP: 115.143.165.155 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.226192129 NORDC_MX400_1 flows src=125.236.75.208 dst=58.47.26.79 protocol=tcp sport=15378 dport=25 pattern: 1 dst 58.47.26.79 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1663633277.226192129 NORDC_MX400_1 flows src=125.236.75.208 dst=58.47.26.79 protocol=tcp sport=15378 dport=25 pattern: 1 dst 58.47.26.79",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 15378,
"protocol": 6,
"streamName": "meraki",
"clientIP": "125.236.75.208",
"serverIP": "58.47.26.79"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1663633277.226192129 NORDC_MX400_1 flows src=125.236.75.208 dst=58.47.26.79 protocol=tcp sport=15378 dport=25 pattern: 1 dst 58.47.26.79 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.226192129 NORDC_MX400_1 flows src=125.236.75.208 dst=58.47.26.79 protocol=tcp sport=15378 dport=25 pattern: 1 dst 58.47.26.79 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 15378
protocol: 6
streamName: meraki
clientIP: 125.236.75.208
serverIP: 58.47.26.79 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=186.66.111.132 dst=10.205.135.5 protocol=tcp sport=58113 dport=25 pattern: 1 dst 10.205.135.5 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=186.66.111.132 dst=10.205.135.5 protocol=tcp sport=58113 dport=25 pattern: 1 dst 10.205.135.5",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 58113,
"protocol": 6,
"streamName": "meraki",
"clientIP": "186.66.111.132",
"serverIP": "10.205.135.5"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=186.66.111.132 dst=10.205.135.5 protocol=tcp sport=58113 dport=25 pattern: 1 dst 10.205.135.5 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=186.66.111.132 dst=10.205.135.5 protocol=tcp sport=58113 dport=25 pattern: 1 dst 10.205.135.5 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 58113
protocol: 6
streamName: meraki
clientIP: 186.66.111.132
serverIP: 10.205.135.5 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=35.87.238.118 dst=211.237.36.242 protocol=tcp sport=58113 dport=25 pattern: 1 dst 211.237.36.242 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=35.87.238.118 dst=211.237.36.242 protocol=tcp sport=58113 dport=25 pattern: 1 dst 211.237.36.242",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 58113,
"protocol": 6,
"streamName": "meraki",
"clientIP": "35.87.238.118",
"serverIP": "211.237.36.242"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=35.87.238.118 dst=211.237.36.242 protocol=tcp sport=58113 dport=25 pattern: 1 dst 211.237.36.242 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=35.87.238.118 dst=211.237.36.242 protocol=tcp sport=58113 dport=25 pattern: 1 dst 211.237.36.242 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 58113
protocol: 6
streamName: meraki
clientIP: 35.87.238.118
serverIP: 211.237.36.242 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.389541881 NORDC_MX400_1 flows src=173.200.237.219 dst=169.126.210.177 protocol=tcp sport=37994 dport=25 pattern: 1 dst 169.126.210.177 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1663633277.389541881 NORDC_MX400_1 flows src=173.200.237.219 dst=169.126.210.177 protocol=tcp sport=37994 dport=25 pattern: 1 dst 169.126.210.177",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 37994,
"protocol": 6,
"streamName": "meraki",
"clientIP": "173.200.237.219",
"serverIP": "169.126.210.177"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1663633277.389541881 NORDC_MX400_1 flows src=173.200.237.219 dst=169.126.210.177 protocol=tcp sport=37994 dport=25 pattern: 1 dst 169.126.210.177 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.389541881 NORDC_MX400_1 flows src=173.200.237.219 dst=169.126.210.177 protocol=tcp sport=37994 dport=25 pattern: 1 dst 169.126.210.177 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 37994
protocol: 6
streamName: meraki
clientIP: 173.200.237.219
serverIP: 169.126.210.177 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.389541881 NORDC_MX400_1 flows src=120.155.35.249 dst=152.49.210.21 protocol=tcp sport=37994 dport=25 pattern: 1 dst 152.49.210.21 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1663633277.389541881 NORDC_MX400_1 flows src=120.155.35.249 dst=152.49.210.21 protocol=tcp sport=37994 dport=25 pattern: 1 dst 152.49.210.21",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 37994,
"protocol": 6,
"streamName": "meraki",
"clientIP": "120.155.35.249",
"serverIP": "152.49.210.21"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1663633277.389541881 NORDC_MX400_1 flows src=120.155.35.249 dst=152.49.210.21 protocol=tcp sport=37994 dport=25 pattern: 1 dst 152.49.210.21 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.389541881 NORDC_MX400_1 flows src=120.155.35.249 dst=152.49.210.21 protocol=tcp sport=37994 dport=25 pattern: 1 dst 152.49.210.21 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 37994
protocol: 6
streamName: meraki
clientIP: 120.155.35.249
serverIP: 152.49.210.21 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.776776630 NORDC_MX400_1 flows src=12.161.240.106 dst=142.185.210.226 protocol=tcp sport=9068 dport=25 pattern: 1 dst 142.185.210.226 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1663633277.776776630 NORDC_MX400_1 flows src=12.161.240.106 dst=142.185.210.226 protocol=tcp sport=9068 dport=25 pattern: 1 dst 142.185.210.226",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 9068,
"protocol": 6,
"streamName": "meraki",
"clientIP": "12.161.240.106",
"serverIP": "142.185.210.226"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1663633277.776776630 NORDC_MX400_1 flows src=12.161.240.106 dst=142.185.210.226 protocol=tcp sport=9068 dport=25 pattern: 1 dst 142.185.210.226 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.776776630 NORDC_MX400_1 flows src=12.161.240.106 dst=142.185.210.226 protocol=tcp sport=9068 dport=25 pattern: 1 dst 142.185.210.226 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 9068
protocol: 6
streamName: meraki
clientIP: 12.161.240.106
serverIP: 142.185.210.226 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.776776630 NORDC_MX400_1 flows src=33.44.133.201 dst=51.195.121.122 protocol=tcp sport=9068 dport=25 pattern: 1 dst 51.195.121.122 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1663633277.776776630 NORDC_MX400_1 flows src=33.44.133.201 dst=51.195.121.122 protocol=tcp sport=9068 dport=25 pattern: 1 dst 51.195.121.122",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 9068,
"protocol": 6,
"streamName": "meraki",
"clientIP": "33.44.133.201",
"serverIP": "51.195.121.122"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1663633277.776776630 NORDC_MX400_1 flows src=33.44.133.201 dst=51.195.121.122 protocol=tcp sport=9068 dport=25 pattern: 1 dst 51.195.121.122 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.776776630 NORDC_MX400_1 flows src=33.44.133.201 dst=51.195.121.122 protocol=tcp sport=9068 dport=25 pattern: 1 dst 51.195.121.122 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 9068
protocol: 6
streamName: meraki
clientIP: 33.44.133.201
serverIP: 51.195.121.122 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.808467158 NORDC_MX400_1 flows src=160.151.210.101 dst=91.20.18.255 protocol=tcp sport=6182 dport=25 pattern: 1 dst 91.20.18.255 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1663633277.808467158 NORDC_MX400_1 flows src=160.151.210.101 dst=91.20.18.255 protocol=tcp sport=6182 dport=25 pattern: 1 dst 91.20.18.255",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6182,
"protocol": 6,
"streamName": "meraki",
"clientIP": "160.151.210.101",
"serverIP": "91.20.18.255"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1663633277.808467158 NORDC_MX400_1 flows src=160.151.210.101 dst=91.20.18.255 protocol=tcp sport=6182 dport=25 pattern: 1 dst 91.20.18.255 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.808467158 NORDC_MX400_1 flows src=160.151.210.101 dst=91.20.18.255 protocol=tcp sport=6182 dport=25 pattern: 1 dst 91.20.18.255 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6182
protocol: 6
streamName: meraki
clientIP: 160.151.210.101
serverIP: 91.20.18.255 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.808467158 NORDC_MX400_1 flows src=148.147.244.78 dst=190.141.16.201 protocol=tcp sport=6182 dport=25 pattern: 1 dst 190.141.16.201 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1663633277.808467158 NORDC_MX400_1 flows src=148.147.244.78 dst=190.141.16.201 protocol=tcp sport=6182 dport=25 pattern: 1 dst 190.141.16.201",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6182,
"protocol": 6,
"streamName": "meraki",
"clientIP": "148.147.244.78",
"serverIP": "190.141.16.201"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1663633277.808467158 NORDC_MX400_1 flows src=148.147.244.78 dst=190.141.16.201 protocol=tcp sport=6182 dport=25 pattern: 1 dst 190.141.16.201 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.808467158 NORDC_MX400_1 flows src=148.147.244.78 dst=190.141.16.201 protocol=tcp sport=6182 dport=25 pattern: 1 dst 190.141.16.201 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6182
protocol: 6
streamName: meraki
clientIP: 148.147.244.78
serverIP: 190.141.16.201 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.301569088 NORDC_MX400_1 flows src=95.220.97.181 dst=27.193.6.191 protocol=tcp sport=6175 dport=25 pattern: 1 dst 27.193.6.191 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1663633277.301569088 NORDC_MX400_1 flows src=95.220.97.181 dst=27.193.6.191 protocol=tcp sport=6175 dport=25 pattern: 1 dst 27.193.6.191",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6175,
"protocol": 6,
"streamName": "meraki",
"clientIP": "95.220.97.181",
"serverIP": "27.193.6.191"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1663633277.301569088 NORDC_MX400_1 flows src=95.220.97.181 dst=27.193.6.191 protocol=tcp sport=6175 dport=25 pattern: 1 dst 27.193.6.191 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.301569088 NORDC_MX400_1 flows src=95.220.97.181 dst=27.193.6.191 protocol=tcp sport=6175 dport=25 pattern: 1 dst 27.193.6.191 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6175
protocol: 6
streamName: meraki
clientIP: 95.220.97.181
serverIP: 27.193.6.191 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.301569088 NORDC_MX400_1 flows src=20.182.64.231 dst=229.181.176.221 protocol=tcp sport=6175 dport=25 pattern: 1 dst 229.181.176.221 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1663633277.301569088 NORDC_MX400_1 flows src=20.182.64.231 dst=229.181.176.221 protocol=tcp sport=6175 dport=25 pattern: 1 dst 229.181.176.221",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 6175,
"protocol": 6,
"streamName": "meraki",
"clientIP": "20.182.64.231",
"serverIP": "229.181.176.221"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1663633277.301569088 NORDC_MX400_1 flows src=20.182.64.231 dst=229.181.176.221 protocol=tcp sport=6175 dport=25 pattern: 1 dst 229.181.176.221 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.301569088 NORDC_MX400_1 flows src=20.182.64.231 dst=229.181.176.221 protocol=tcp sport=6175 dport=25 pattern: 1 dst 229.181.176.221 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6175
protocol: 6
streamName: meraki
clientIP: 20.182.64.231
serverIP: 229.181.176.221 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.309734870 NORDC_MX400_1 flows src=111.223.182.25 dst=241.147.84.10 protocol=tcp sport=22528 dport=25 pattern: 1 dst 241.147.84.10 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1663633277.309734870 NORDC_MX400_1 flows src=111.223.182.25 dst=241.147.84.10 protocol=tcp sport=22528 dport=25 pattern: 1 dst 241.147.84.10",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 22528,
"protocol": 6,
"streamName": "meraki",
"clientIP": "111.223.182.25",
"serverIP": "241.147.84.10"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1663633277.309734870 NORDC_MX400_1 flows src=111.223.182.25 dst=241.147.84.10 protocol=tcp sport=22528 dport=25 pattern: 1 dst 241.147.84.10 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.309734870 NORDC_MX400_1 flows src=111.223.182.25 dst=241.147.84.10 protocol=tcp sport=22528 dport=25 pattern: 1 dst 241.147.84.10 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 22528
protocol: 6
streamName: meraki
clientIP: 111.223.182.25
serverIP: 241.147.84.10 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.309734870 NORDC_MX400_1 flows src=192.160.220.199 dst=122.73.64.19 protocol=tcp sport=22528 dport=25 pattern: 1 dst 122.73.64.19 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1663633277.309734870 NORDC_MX400_1 flows src=192.160.220.199 dst=122.73.64.19 protocol=tcp sport=22528 dport=25 pattern: 1 dst 122.73.64.19",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 22528,
"protocol": 6,
"streamName": "meraki",
"clientIP": "192.160.220.199",
"serverIP": "122.73.64.19"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1663633277.309734870 NORDC_MX400_1 flows src=192.160.220.199 dst=122.73.64.19 protocol=tcp sport=22528 dport=25 pattern: 1 dst 122.73.64.19 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.309734870 NORDC_MX400_1 flows src=192.160.220.199 dst=122.73.64.19 protocol=tcp sport=22528 dport=25 pattern: 1 dst 122.73.64.19 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 22528
protocol: 6
streamName: meraki
clientIP: 192.160.220.199
serverIP: 122.73.64.19 | Explain this syslog message |
<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=251.238.62.175 dst=175.67.111.116 protocol=tcp sport=13079 dport=902 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 902,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=251.238.62.175 dst=175.67.111.116 protocol=tcp sport=13079 dport=902 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 13079,
"protocol": 6,
"streamName": "meraki",
"clientIP": "251.238.62.175",
"serverIP": "175.67.111.116"
} | Create a JSON artifact from the message |
<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=251.238.62.175 dst=175.67.111.116 protocol=tcp sport=13079 dport=902 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=251.238.62.175 dst=175.67.111.116 protocol=tcp sport=13079 dport=902 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 902
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 13079
protocol: 6
streamName: meraki
clientIP: 251.238.62.175
serverIP: 175.67.111.116 | Explain this syslog message |
<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=74.234.9.122 dst=12.179.142.220 protocol=tcp sport=13079 dport=902 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 902,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=74.234.9.122 dst=12.179.142.220 protocol=tcp sport=13079 dport=902 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 13079,
"protocol": 6,
"streamName": "meraki",
"clientIP": "74.234.9.122",
"serverIP": "12.179.142.220"
} | Create a JSON artifact from the message |
<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=74.234.9.122 dst=12.179.142.220 protocol=tcp sport=13079 dport=902 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=74.234.9.122 dst=12.179.142.220 protocol=tcp sport=13079 dport=902 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 902
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 13079
protocol: 6
streamName: meraki
clientIP: 74.234.9.122
serverIP: 12.179.142.220 | Explain this syslog message |
<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=77.146.177.107 dst=179.109.118.168 protocol=tcp sport=13079 dport=902 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 902,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=77.146.177.107 dst=179.109.118.168 protocol=tcp sport=13079 dport=902 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 13079,
"protocol": 6,
"streamName": "meraki",
"clientIP": "77.146.177.107",
"serverIP": "179.109.118.168"
} | Create a JSON artifact from the message |
<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=77.146.177.107 dst=179.109.118.168 protocol=tcp sport=13079 dport=902 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=77.146.177.107 dst=179.109.118.168 protocol=tcp sport=13079 dport=902 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 902
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 13079
protocol: 6
streamName: meraki
clientIP: 77.146.177.107
serverIP: 179.109.118.168 | Explain this syslog message |
<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=98.174.192.12 dst=241.98.50.107 protocol=tcp sport=13079 dport=902 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 902,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=98.174.192.12 dst=241.98.50.107 protocol=tcp sport=13079 dport=902 pattern: 1 all",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 13079,
"protocol": 6,
"streamName": "meraki",
"clientIP": "98.174.192.12",
"serverIP": "241.98.50.107"
} | Create a JSON artifact from the message |
<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=98.174.192.12 dst=241.98.50.107 protocol=tcp sport=13079 dport=902 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=98.174.192.12 dst=241.98.50.107 protocol=tcp sport=13079 dport=902 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 902
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 13079
protocol: 6
streamName: meraki
clientIP: 98.174.192.12
serverIP: 241.98.50.107 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.666821676 NORDC_MX400_1 flows src=20.75.219.88 dst=34.107.220.87 protocol=tcp sport=47104 dport=25 pattern: 1 dst 34.107.220.87 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658389062.666821676 NORDC_MX400_1 flows src=20.75.219.88 dst=34.107.220.87 protocol=tcp sport=47104 dport=25 pattern: 1 dst 34.107.220.87",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 47104,
"protocol": 6,
"streamName": "meraki",
"clientIP": "20.75.219.88",
"serverIP": "34.107.220.87"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658389062.666821676 NORDC_MX400_1 flows src=20.75.219.88 dst=34.107.220.87 protocol=tcp sport=47104 dport=25 pattern: 1 dst 34.107.220.87 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.666821676 NORDC_MX400_1 flows src=20.75.219.88 dst=34.107.220.87 protocol=tcp sport=47104 dport=25 pattern: 1 dst 34.107.220.87 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 47104
protocol: 6
streamName: meraki
clientIP: 20.75.219.88
serverIP: 34.107.220.87 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.666821676 NORDC_MX400_1 flows src=116.0.227.6 dst=33.33.173.49 protocol=tcp sport=47104 dport=25 pattern: 1 dst 33.33.173.49 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658389062.666821676 NORDC_MX400_1 flows src=116.0.227.6 dst=33.33.173.49 protocol=tcp sport=47104 dport=25 pattern: 1 dst 33.33.173.49",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 47104,
"protocol": 6,
"streamName": "meraki",
"clientIP": "116.0.227.6",
"serverIP": "33.33.173.49"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658389062.666821676 NORDC_MX400_1 flows src=116.0.227.6 dst=33.33.173.49 protocol=tcp sport=47104 dport=25 pattern: 1 dst 33.33.173.49 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.666821676 NORDC_MX400_1 flows src=116.0.227.6 dst=33.33.173.49 protocol=tcp sport=47104 dport=25 pattern: 1 dst 33.33.173.49 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 47104
protocol: 6
streamName: meraki
clientIP: 116.0.227.6
serverIP: 33.33.173.49 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658389061.876971670 NORDC_MX400_1 flows src=58.12.126.33 dst=122.19.215.105 protocol=tcp sport=20807 dport=25 pattern: 1 dst 122.19.215.105 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658389061.876971670 NORDC_MX400_1 flows src=58.12.126.33 dst=122.19.215.105 protocol=tcp sport=20807 dport=25 pattern: 1 dst 122.19.215.105",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 20807,
"protocol": 6,
"streamName": "meraki",
"clientIP": "58.12.126.33",
"serverIP": "122.19.215.105"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658389061.876971670 NORDC_MX400_1 flows src=58.12.126.33 dst=122.19.215.105 protocol=tcp sport=20807 dport=25 pattern: 1 dst 122.19.215.105 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658389061.876971670 NORDC_MX400_1 flows src=58.12.126.33 dst=122.19.215.105 protocol=tcp sport=20807 dport=25 pattern: 1 dst 122.19.215.105 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 20807
protocol: 6
streamName: meraki
clientIP: 58.12.126.33
serverIP: 122.19.215.105 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658389061.876971670 NORDC_MX400_1 flows src=208.221.40.81 dst=17.197.187.90 protocol=tcp sport=20807 dport=25 pattern: 1 dst 17.197.187.90 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658389061.876971670 NORDC_MX400_1 flows src=208.221.40.81 dst=17.197.187.90 protocol=tcp sport=20807 dport=25 pattern: 1 dst 17.197.187.90",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 20807,
"protocol": 6,
"streamName": "meraki",
"clientIP": "208.221.40.81",
"serverIP": "17.197.187.90"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658389061.876971670 NORDC_MX400_1 flows src=208.221.40.81 dst=17.197.187.90 protocol=tcp sport=20807 dport=25 pattern: 1 dst 17.197.187.90 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658389061.876971670 NORDC_MX400_1 flows src=208.221.40.81 dst=17.197.187.90 protocol=tcp sport=20807 dport=25 pattern: 1 dst 17.197.187.90 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 20807
protocol: 6
streamName: meraki
clientIP: 208.221.40.81
serverIP: 17.197.187.90 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.540627277 NORDC_MX400_1 flows src=180.15.146.141 dst=198.162.20.103 protocol=tcp sport=57271 dport=25 pattern: 1 dst 198.162.20.103 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658389062.540627277 NORDC_MX400_1 flows src=180.15.146.141 dst=198.162.20.103 protocol=tcp sport=57271 dport=25 pattern: 1 dst 198.162.20.103",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 57271,
"protocol": 6,
"streamName": "meraki",
"clientIP": "180.15.146.141",
"serverIP": "198.162.20.103"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658389062.540627277 NORDC_MX400_1 flows src=180.15.146.141 dst=198.162.20.103 protocol=tcp sport=57271 dport=25 pattern: 1 dst 198.162.20.103 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.540627277 NORDC_MX400_1 flows src=180.15.146.141 dst=198.162.20.103 protocol=tcp sport=57271 dport=25 pattern: 1 dst 198.162.20.103 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 57271
protocol: 6
streamName: meraki
clientIP: 180.15.146.141
serverIP: 198.162.20.103 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.540627277 NORDC_MX400_1 flows src=170.96.220.53 dst=31.31.245.130 protocol=tcp sport=57271 dport=25 pattern: 1 dst 31.31.245.130 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658389062.540627277 NORDC_MX400_1 flows src=170.96.220.53 dst=31.31.245.130 protocol=tcp sport=57271 dport=25 pattern: 1 dst 31.31.245.130",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 57271,
"protocol": 6,
"streamName": "meraki",
"clientIP": "170.96.220.53",
"serverIP": "31.31.245.130"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658389062.540627277 NORDC_MX400_1 flows src=170.96.220.53 dst=31.31.245.130 protocol=tcp sport=57271 dport=25 pattern: 1 dst 31.31.245.130 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.540627277 NORDC_MX400_1 flows src=170.96.220.53 dst=31.31.245.130 protocol=tcp sport=57271 dport=25 pattern: 1 dst 31.31.245.130 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 57271
protocol: 6
streamName: meraki
clientIP: 170.96.220.53
serverIP: 31.31.245.130 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.578624528 NORDC_MX400_1 flows src=204.129.0.121 dst=142.1.152.59 protocol=tcp sport=58721 dport=25 pattern: 1 dst 142.1.152.59 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658389062.578624528 NORDC_MX400_1 flows src=204.129.0.121 dst=142.1.152.59 protocol=tcp sport=58721 dport=25 pattern: 1 dst 142.1.152.59",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 58721,
"protocol": 6,
"streamName": "meraki",
"clientIP": "204.129.0.121",
"serverIP": "142.1.152.59"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658389062.578624528 NORDC_MX400_1 flows src=204.129.0.121 dst=142.1.152.59 protocol=tcp sport=58721 dport=25 pattern: 1 dst 142.1.152.59 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.578624528 NORDC_MX400_1 flows src=204.129.0.121 dst=142.1.152.59 protocol=tcp sport=58721 dport=25 pattern: 1 dst 142.1.152.59 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 58721
protocol: 6
streamName: meraki
clientIP: 204.129.0.121
serverIP: 142.1.152.59 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.578624528 NORDC_MX400_1 flows src=76.68.182.160 dst=157.155.131.186 protocol=tcp sport=58721 dport=25 pattern: 1 dst 157.155.131.186 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658389062.578624528 NORDC_MX400_1 flows src=76.68.182.160 dst=157.155.131.186 protocol=tcp sport=58721 dport=25 pattern: 1 dst 157.155.131.186",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 58721,
"protocol": 6,
"streamName": "meraki",
"clientIP": "76.68.182.160",
"serverIP": "157.155.131.186"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658389062.578624528 NORDC_MX400_1 flows src=76.68.182.160 dst=157.155.131.186 protocol=tcp sport=58721 dport=25 pattern: 1 dst 157.155.131.186 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.578624528 NORDC_MX400_1 flows src=76.68.182.160 dst=157.155.131.186 protocol=tcp sport=58721 dport=25 pattern: 1 dst 157.155.131.186 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 58721
protocol: 6
streamName: meraki
clientIP: 76.68.182.160
serverIP: 157.155.131.186 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.593258665 NORDC_MX400_1 flows src=54.56.223.38 dst=130.9.189.44 protocol=tcp sport=41315 dport=25 pattern: 1 dst 130.9.189.44 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658389062.593258665 NORDC_MX400_1 flows src=54.56.223.38 dst=130.9.189.44 protocol=tcp sport=41315 dport=25 pattern: 1 dst 130.9.189.44",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 41315,
"protocol": 6,
"streamName": "meraki",
"clientIP": "54.56.223.38",
"serverIP": "130.9.189.44"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658389062.593258665 NORDC_MX400_1 flows src=54.56.223.38 dst=130.9.189.44 protocol=tcp sport=41315 dport=25 pattern: 1 dst 130.9.189.44 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.593258665 NORDC_MX400_1 flows src=54.56.223.38 dst=130.9.189.44 protocol=tcp sport=41315 dport=25 pattern: 1 dst 130.9.189.44 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 41315
protocol: 6
streamName: meraki
clientIP: 54.56.223.38
serverIP: 130.9.189.44 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.593258665 NORDC_MX400_1 flows src=45.134.53.224 dst=230.209.212.226 protocol=tcp sport=41315 dport=25 pattern: 1 dst 230.209.212.226 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658389062.593258665 NORDC_MX400_1 flows src=45.134.53.224 dst=230.209.212.226 protocol=tcp sport=41315 dport=25 pattern: 1 dst 230.209.212.226",
"action": "block",
"sensitivity": "normal",
"messagetype": "flow",
"clientport": 41315,
"protocol": 6,
"streamName": "meraki",
"clientIP": "45.134.53.224",
"serverIP": "230.209.212.226"
} | Create a JSON artifact from the message |
Subsets and Splits