input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
<185>Jan 11 14:12:58 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=253.121.64.192 dpt=80 act=DENY msg=[Known SSH Attack Source] duser="-" src=66.200.50.1 spt=52764 requestMethod=GET app=HTTP requestContext="-" start=Jan 11 2023 14:12:58 rt=1673467978899 request=/ requestClientApplication="Unknown" dvchost=WAFirewall externalId=185a276e479-bd6590d0 cn2=52764 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=66.200.50.1 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 80
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'ProxyIP:154.89.5.98', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1673467978899
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /
clientport: 52764
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 66.200.50.1
serverIP: 253.121.64.192
userName: - | Explain this syslog message |
<185>Jun 4 20:17:09 WAFirewall CEF:0|Barracuda|WAF|1220|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=251.33.171.48 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://www.ccr-bhm.org/"] duser="-" src=91.101.234.106 spt=54904 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jun 04 2024 20:17:09 rt=1717550229650 request=/comm/AndarTrack.jsp requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=18fe5f8a892-449c2049 cn2=54904 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=91.101.234.106 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 54904,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/comm/AndarTrack.jsp",
"localhostname": "WAFirewall",
"localstarttime": "1717550229650 ",
"message": "<185>Jun 4 20:17:09 WAFirewall CEF:0|Barracuda|WAF|1220|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=251.33.171.48 dpt=443 act=DENY msg=[type\\=\"remote-file-inclusion\" pattern\\=\"php-file-inclusion\" token\\=\"http\\\\:/\" Parameter\\=\"F\" value\\=\"http\\\\://www.ccr-bhm.org/\"] duser=\"-\" src=91.101.234.106 spt=54904 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jun 04 2024 20:17:09 rt=1717550229650 request=/comm/AndarTrack.jsp requestClientApplication=\"facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)\" dvchost=WAFirewall externalId=18fe5f8a892-449c2049 cn2=54904 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=91.101.234.106 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "REMOTE_FILE_INCLUSION",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleType:GLOBAL",
"ProxyIP:69.171.249.17",
"barracuda_waf",
"REMOTE_FILE_INCLUSION",
"cef",
"FollowUpAction:NONE",
"barracuda_waf_REMOTE_FILE_INCLUSION",
"AttackGroup:Injection Attacks",
"rfc3164",
"RuleID:security-policy",
"SessionID:-"
],
"vendorcode": "164",
"streamName": "barracuda_waf",
"clientIP": "91.101.234.106",
"serverIP": "251.33.171.48",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jun 4 20:17:09 WAFirewall CEF:0|Barracuda|WAF|1220|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=251.33.171.48 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://www.ccr-bhm.org/"] duser="-" src=91.101.234.106 spt=54904 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jun 04 2024 20:17:09 rt=1717550229650 request=/comm/AndarTrack.jsp requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=18fe5f8a892-449c2049 cn2=54904 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=91.101.234.106 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jun 4 20:17:09 WAFirewall CEF:0|Barracuda|WAF|1220|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=251.33.171.48 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://www.ccr-bhm.org/"] duser="-" src=91.101.234.106 spt=54904 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jun 04 2024 20:17:09 rt=1717550229650 request=/comm/AndarTrack.jsp requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=18fe5f8a892-449c2049 cn2=54904 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=91.101.234.106 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 54904
facilitycode: 23
facilitylabel: local7
fqdn: /comm/AndarTrack.jsp
localhostname: WAFirewall
localstarttime: 1717550229650
messagetype: REMOTE_FILE_INCLUSION
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleType:GLOBAL', 'ProxyIP:69.171.249.17', 'barracuda_waf', 'REMOTE_FILE_INCLUSION', 'cef', 'FollowUpAction:NONE', 'barracuda_waf_REMOTE_FILE_INCLUSION', 'AttackGroup:Injection Attacks', 'rfc3164', 'RuleID:security-policy', 'SessionID:-']
vendorcode: 164
streamName: barracuda_waf
clientIP: 91.101.234.106
serverIP: 251.33.171.48
userName: - | Explain this syslog message |
<185>Jun 4 20:17:09 WAFirewall CEF:0|Barracuda|WAF|1220|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=174.192.6.10 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://www.ccr-bhm.org/"] duser="-" src=242.149.238.159 spt=54904 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jun 04 2024 20:17:09 rt=1717550229650 request=/comm/AndarTrack.jsp requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=18fe5f8a892-449c2049 cn2=54904 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=242.149.238.159 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 54904,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/comm/AndarTrack.jsp",
"localhostname": "WAFirewall",
"localstarttime": "1717550229650 ",
"message": "<185>Jun 4 20:17:09 WAFirewall CEF:0|Barracuda|WAF|1220|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=174.192.6.10 dpt=443 act=DENY msg=[type\\=\"remote-file-inclusion\" pattern\\=\"php-file-inclusion\" token\\=\"http\\\\:/\" Parameter\\=\"F\" value\\=\"http\\\\://www.ccr-bhm.org/\"] duser=\"-\" src=242.149.238.159 spt=54904 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jun 04 2024 20:17:09 rt=1717550229650 request=/comm/AndarTrack.jsp requestClientApplication=\"facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)\" dvchost=WAFirewall externalId=18fe5f8a892-449c2049 cn2=54904 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=242.149.238.159 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "REMOTE_FILE_INCLUSION",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleType:GLOBAL",
"ProxyIP:69.171.249.17",
"barracuda_waf",
"REMOTE_FILE_INCLUSION",
"cef",
"FollowUpAction:NONE",
"barracuda_waf_REMOTE_FILE_INCLUSION",
"AttackGroup:Injection Attacks",
"rfc3164",
"RuleID:security-policy",
"SessionID:-"
],
"vendorcode": "164",
"streamName": "barracuda_waf",
"clientIP": "242.149.238.159",
"serverIP": "174.192.6.10",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jun 4 20:17:09 WAFirewall CEF:0|Barracuda|WAF|1220|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=174.192.6.10 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://www.ccr-bhm.org/"] duser="-" src=242.149.238.159 spt=54904 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jun 04 2024 20:17:09 rt=1717550229650 request=/comm/AndarTrack.jsp requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=18fe5f8a892-449c2049 cn2=54904 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=242.149.238.159 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jun 4 20:17:09 WAFirewall CEF:0|Barracuda|WAF|1220|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=174.192.6.10 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://www.ccr-bhm.org/"] duser="-" src=242.149.238.159 spt=54904 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jun 04 2024 20:17:09 rt=1717550229650 request=/comm/AndarTrack.jsp requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=18fe5f8a892-449c2049 cn2=54904 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=242.149.238.159 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 54904
facilitycode: 23
facilitylabel: local7
fqdn: /comm/AndarTrack.jsp
localhostname: WAFirewall
localstarttime: 1717550229650
messagetype: REMOTE_FILE_INCLUSION
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleType:GLOBAL', 'ProxyIP:69.171.249.17', 'barracuda_waf', 'REMOTE_FILE_INCLUSION', 'cef', 'FollowUpAction:NONE', 'barracuda_waf_REMOTE_FILE_INCLUSION', 'AttackGroup:Injection Attacks', 'rfc3164', 'RuleID:security-policy', 'SessionID:-']
vendorcode: 164
streamName: barracuda_waf
clientIP: 242.149.238.159
serverIP: 174.192.6.10
userName: - | Explain this syslog message |
<185>Jun 4 20:17:09 WAFirewall CEF:0|Barracuda|WAF|1220|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=76.79.40.149 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://www.ccr-bhm.org/"] duser="-" src=166.34.5.5 spt=54904 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jun 04 2024 20:17:09 rt=1717550229650 request=/comm/AndarTrack.jsp requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=18fe5f8a892-449c2049 cn2=54904 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=166.34.5.5 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 54904,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/comm/AndarTrack.jsp",
"localhostname": "WAFirewall",
"localstarttime": "1717550229650 ",
"message": "<185>Jun 4 20:17:09 WAFirewall CEF:0|Barracuda|WAF|1220|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=76.79.40.149 dpt=443 act=DENY msg=[type\\=\"remote-file-inclusion\" pattern\\=\"php-file-inclusion\" token\\=\"http\\\\:/\" Parameter\\=\"F\" value\\=\"http\\\\://www.ccr-bhm.org/\"] duser=\"-\" src=166.34.5.5 spt=54904 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Jun 04 2024 20:17:09 rt=1717550229650 request=/comm/AndarTrack.jsp requestClientApplication=\"facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)\" dvchost=WAFirewall externalId=18fe5f8a892-449c2049 cn2=54904 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=166.34.5.5 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "REMOTE_FILE_INCLUSION",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleType:GLOBAL",
"ProxyIP:69.171.249.17",
"barracuda_waf",
"REMOTE_FILE_INCLUSION",
"cef",
"FollowUpAction:NONE",
"barracuda_waf_REMOTE_FILE_INCLUSION",
"AttackGroup:Injection Attacks",
"rfc3164",
"RuleID:security-policy",
"SessionID:-"
],
"vendorcode": "164",
"streamName": "barracuda_waf",
"clientIP": "166.34.5.5",
"serverIP": "76.79.40.149",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Jun 4 20:17:09 WAFirewall CEF:0|Barracuda|WAF|1220|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=76.79.40.149 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://www.ccr-bhm.org/"] duser="-" src=166.34.5.5 spt=54904 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jun 04 2024 20:17:09 rt=1717550229650 request=/comm/AndarTrack.jsp requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=18fe5f8a892-449c2049 cn2=54904 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=166.34.5.5 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Jun 4 20:17:09 WAFirewall CEF:0|Barracuda|WAF|1220|164|REMOTE_FILE_INCLUSION|1|cat=WF dst=76.79.40.149 dpt=443 act=DENY msg=[type\="remote-file-inclusion" pattern\="php-file-inclusion" token\="http\\:/" Parameter\="F" value\="http\\://www.ccr-bhm.org/"] duser="-" src=166.34.5.5 spt=54904 requestMethod=GET app=TLSv1.3 requestContext="-" start=Jun 04 2024 20:17:09 rt=1717550229650 request=/comm/AndarTrack.jsp requestClientApplication="facebookexternalhit/1.1 (+http://www.facebook.com/externalhit_uatext.php)" dvchost=WAFirewall externalId=18fe5f8a892-449c2049 cn2=54904 cn2Label=ProxyPort cs1=security-policy cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Injection Attacks cs4Label=AttackGroup cs5=166.34.5.5 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 54904
facilitycode: 23
facilitylabel: local7
fqdn: /comm/AndarTrack.jsp
localhostname: WAFirewall
localstarttime: 1717550229650
messagetype: REMOTE_FILE_INCLUSION
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleType:GLOBAL', 'ProxyIP:69.171.249.17', 'barracuda_waf', 'REMOTE_FILE_INCLUSION', 'cef', 'FollowUpAction:NONE', 'barracuda_waf_REMOTE_FILE_INCLUSION', 'AttackGroup:Injection Attacks', 'rfc3164', 'RuleID:security-policy', 'SessionID:-']
vendorcode: 164
streamName: barracuda_waf
clientIP: 166.34.5.5
serverIP: 76.79.40.149
userName: - | Explain this syslog message |
<134>Original Address=24.96.192.50 1 1657561394.361923630 M57_MX67C_PanamaCity l7_firewall src=217.238.184.190 dst=134.250.82.76 protocol=tcp sport=63943 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.96.192.50 1 1657561394.361923630 M57_MX67C_PanamaCity l7_firewall src=217.238.184.190 dst=134.250.82.76 protocol=tcp sport=63943 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 63943,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "217.238.184.190",
"serverIP": "134.250.82.76"
} | Create a JSON artifact from the message |
<134>Original Address=24.96.192.50 1 1657561394.361923630 M57_MX67C_PanamaCity l7_firewall src=217.238.184.190 dst=134.250.82.76 protocol=tcp sport=63943 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.96.192.50 1 1657561394.361923630 M57_MX67C_PanamaCity l7_firewall src=217.238.184.190 dst=134.250.82.76 protocol=tcp sport=63943 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 63943
protocol: 6
streamName: meraki_l7_firewall
clientIP: 217.238.184.190
serverIP: 134.250.82.76 | Explain this syslog message |
<134>Original Address=24.96.192.50 1 1657561394.361923630 M57_MX67C_PanamaCity l7_firewall src=223.172.252.79 dst=51.242.118.186 protocol=tcp sport=63943 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.96.192.50 1 1657561394.361923630 M57_MX67C_PanamaCity l7_firewall src=223.172.252.79 dst=51.242.118.186 protocol=tcp sport=63943 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 63943,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "223.172.252.79",
"serverIP": "51.242.118.186"
} | Create a JSON artifact from the message |
<134>Original Address=24.96.192.50 1 1657561394.361923630 M57_MX67C_PanamaCity l7_firewall src=223.172.252.79 dst=51.242.118.186 protocol=tcp sport=63943 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.96.192.50 1 1657561394.361923630 M57_MX67C_PanamaCity l7_firewall src=223.172.252.79 dst=51.242.118.186 protocol=tcp sport=63943 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 63943
protocol: 6
streamName: meraki_l7_firewall
clientIP: 223.172.252.79
serverIP: 51.242.118.186 | Explain this syslog message |
<134>Original Address=24.96.192.50 1 1657561394.361923630 M57_MX67C_PanamaCity l7_firewall src=137.136.223.98 dst=48.254.218.105 protocol=tcp sport=63943 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.96.192.50 1 1657561394.361923630 M57_MX67C_PanamaCity l7_firewall src=137.136.223.98 dst=48.254.218.105 protocol=tcp sport=63943 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 63943,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "137.136.223.98",
"serverIP": "48.254.218.105"
} | Create a JSON artifact from the message |
<134>Original Address=24.96.192.50 1 1657561394.361923630 M57_MX67C_PanamaCity l7_firewall src=137.136.223.98 dst=48.254.218.105 protocol=tcp sport=63943 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.96.192.50 1 1657561394.361923630 M57_MX67C_PanamaCity l7_firewall src=137.136.223.98 dst=48.254.218.105 protocol=tcp sport=63943 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 63943
protocol: 6
streamName: meraki_l7_firewall
clientIP: 137.136.223.98
serverIP: 48.254.218.105 | Explain this syslog message |
<134>Original Address=24.96.192.50 1 1657561394.361923630 M57_MX67C_PanamaCity l7_firewall src=1.190.161.117 dst=234.233.90.192 protocol=tcp sport=63943 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.96.192.50 1 1657561394.361923630 M57_MX67C_PanamaCity l7_firewall src=1.190.161.117 dst=234.233.90.192 protocol=tcp sport=63943 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 63943,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "1.190.161.117",
"serverIP": "234.233.90.192"
} | Create a JSON artifact from the message |
<134>Original Address=24.96.192.50 1 1657561394.361923630 M57_MX67C_PanamaCity l7_firewall src=1.190.161.117 dst=234.233.90.192 protocol=tcp sport=63943 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.96.192.50 1 1657561394.361923630 M57_MX67C_PanamaCity l7_firewall src=1.190.161.117 dst=234.233.90.192 protocol=tcp sport=63943 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 63943
protocol: 6
streamName: meraki_l7_firewall
clientIP: 1.190.161.117
serverIP: 234.233.90.192 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660878989.603667136 NORDC_MX400_1 l7_firewall src=246.224.86.207 dst=93.22.116.205 protocol=udp sport=63119 dport=64745 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 63119,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660878989.603667136 NORDC_MX400_1 l7_firewall src=246.224.86.207 dst=93.22.116.205 protocol=udp sport=63119 dport=64745 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 64745,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "93.22.116.205",
"serverIP": "246.224.86.207"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660878989.603667136 NORDC_MX400_1 l7_firewall src=246.224.86.207 dst=93.22.116.205 protocol=udp sport=63119 dport=64745 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660878989.603667136 NORDC_MX400_1 l7_firewall src=246.224.86.207 dst=93.22.116.205 protocol=udp sport=63119 dport=64745 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 63119
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 64745
protocol: 17
streamName: meraki_l7_firewall
clientIP: 93.22.116.205
serverIP: 246.224.86.207 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660878989.603667136 NORDC_MX400_1 l7_firewall src=183.105.252.219 dst=157.100.29.147 protocol=udp sport=63119 dport=64745 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 63119,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660878989.603667136 NORDC_MX400_1 l7_firewall src=183.105.252.219 dst=157.100.29.147 protocol=udp sport=63119 dport=64745 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 64745,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "157.100.29.147",
"serverIP": "183.105.252.219"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660878989.603667136 NORDC_MX400_1 l7_firewall src=183.105.252.219 dst=157.100.29.147 protocol=udp sport=63119 dport=64745 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660878989.603667136 NORDC_MX400_1 l7_firewall src=183.105.252.219 dst=157.100.29.147 protocol=udp sport=63119 dport=64745 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 63119
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 64745
protocol: 17
streamName: meraki_l7_firewall
clientIP: 157.100.29.147
serverIP: 183.105.252.219 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660878989.603573265 NORDC_MX400_1 l7_firewall src=243.104.215.106 dst=133.207.151.204 protocol=udp sport=63119 dport=55351 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 55351,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660878989.603573265 NORDC_MX400_1 l7_firewall src=243.104.215.106 dst=133.207.151.204 protocol=udp sport=63119 dport=55351 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 63119,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "243.104.215.106",
"serverIP": "133.207.151.204"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660878989.603573265 NORDC_MX400_1 l7_firewall src=243.104.215.106 dst=133.207.151.204 protocol=udp sport=63119 dport=55351 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660878989.603573265 NORDC_MX400_1 l7_firewall src=243.104.215.106 dst=133.207.151.204 protocol=udp sport=63119 dport=55351 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 55351
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 63119
protocol: 17
streamName: meraki_l7_firewall
clientIP: 243.104.215.106
serverIP: 133.207.151.204 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660878989.603573265 NORDC_MX400_1 l7_firewall src=162.246.35.224 dst=70.56.163.206 protocol=udp sport=63119 dport=55351 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 55351,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660878989.603573265 NORDC_MX400_1 l7_firewall src=162.246.35.224 dst=70.56.163.206 protocol=udp sport=63119 dport=55351 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 63119,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "162.246.35.224",
"serverIP": "70.56.163.206"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660878989.603573265 NORDC_MX400_1 l7_firewall src=162.246.35.224 dst=70.56.163.206 protocol=udp sport=63119 dport=55351 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660878989.603573265 NORDC_MX400_1 l7_firewall src=162.246.35.224 dst=70.56.163.206 protocol=udp sport=63119 dport=55351 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 55351
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 63119
protocol: 17
streamName: meraki_l7_firewall
clientIP: 162.246.35.224
serverIP: 70.56.163.206 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660878989.603667136 NORDC_MX400_1 l7_firewall src=51.211.138.242 dst=3.138.49.36 protocol=udp sport=63119 dport=64745 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 63119,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660878989.603667136 NORDC_MX400_1 l7_firewall src=51.211.138.242 dst=3.138.49.36 protocol=udp sport=63119 dport=64745 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 64745,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "3.138.49.36",
"serverIP": "51.211.138.242"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660878989.603667136 NORDC_MX400_1 l7_firewall src=51.211.138.242 dst=3.138.49.36 protocol=udp sport=63119 dport=64745 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660878989.603667136 NORDC_MX400_1 l7_firewall src=51.211.138.242 dst=3.138.49.36 protocol=udp sport=63119 dport=64745 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 63119
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 64745
protocol: 17
streamName: meraki_l7_firewall
clientIP: 3.138.49.36
serverIP: 51.211.138.242 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660878989.603667136 NORDC_MX400_1 l7_firewall src=6.113.220.182 dst=255.238.178.111 protocol=udp sport=63119 dport=64745 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 63119,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660878989.603667136 NORDC_MX400_1 l7_firewall src=6.113.220.182 dst=255.238.178.111 protocol=udp sport=63119 dport=64745 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 64745,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "255.238.178.111",
"serverIP": "6.113.220.182"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660878989.603667136 NORDC_MX400_1 l7_firewall src=6.113.220.182 dst=255.238.178.111 protocol=udp sport=63119 dport=64745 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660878989.603667136 NORDC_MX400_1 l7_firewall src=6.113.220.182 dst=255.238.178.111 protocol=udp sport=63119 dport=64745 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 63119
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 64745
protocol: 17
streamName: meraki_l7_firewall
clientIP: 255.238.178.111
serverIP: 6.113.220.182 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660878989.603573265 NORDC_MX400_1 l7_firewall src=52.22.16.241 dst=72.123.159.189 protocol=udp sport=63119 dport=55351 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 55351,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660878989.603573265 NORDC_MX400_1 l7_firewall src=52.22.16.241 dst=72.123.159.189 protocol=udp sport=63119 dport=55351 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 63119,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "52.22.16.241",
"serverIP": "72.123.159.189"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660878989.603573265 NORDC_MX400_1 l7_firewall src=52.22.16.241 dst=72.123.159.189 protocol=udp sport=63119 dport=55351 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660878989.603573265 NORDC_MX400_1 l7_firewall src=52.22.16.241 dst=72.123.159.189 protocol=udp sport=63119 dport=55351 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 55351
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 63119
protocol: 17
streamName: meraki_l7_firewall
clientIP: 52.22.16.241
serverIP: 72.123.159.189 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660878989.603573265 NORDC_MX400_1 l7_firewall src=110.119.86.64 dst=13.44.52.221 protocol=udp sport=63119 dport=55351 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 55351,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660878989.603573265 NORDC_MX400_1 l7_firewall src=110.119.86.64 dst=13.44.52.221 protocol=udp sport=63119 dport=55351 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 63119,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "110.119.86.64",
"serverIP": "13.44.52.221"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660878989.603573265 NORDC_MX400_1 l7_firewall src=110.119.86.64 dst=13.44.52.221 protocol=udp sport=63119 dport=55351 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660878989.603573265 NORDC_MX400_1 l7_firewall src=110.119.86.64 dst=13.44.52.221 protocol=udp sport=63119 dport=55351 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 55351
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 63119
protocol: 17
streamName: meraki_l7_firewall
clientIP: 110.119.86.64
serverIP: 13.44.52.221 | Explain this syslog message |
<134>Original Address=97.89.16.253 1 1659554835.789656081 M96_MX67C_MECLawrencevilleMain l7_firewall src=224.43.206.230 dst=56.169.247.38 protocol=tcp sport=42150 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=97.89.16.253 1 1659554835.789656081 M96_MX67C_MECLawrencevilleMain l7_firewall src=224.43.206.230 dst=56.169.247.38 protocol=tcp sport=42150 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 42150,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "224.43.206.230",
"serverIP": "56.169.247.38"
} | Create a JSON artifact from the message |
<134>Original Address=97.89.16.253 1 1659554835.789656081 M96_MX67C_MECLawrencevilleMain l7_firewall src=224.43.206.230 dst=56.169.247.38 protocol=tcp sport=42150 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=97.89.16.253 1 1659554835.789656081 M96_MX67C_MECLawrencevilleMain l7_firewall src=224.43.206.230 dst=56.169.247.38 protocol=tcp sport=42150 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 42150
protocol: 6
streamName: meraki_l7_firewall
clientIP: 224.43.206.230
serverIP: 56.169.247.38 | Explain this syslog message |
<134>Original Address=97.89.16.253 1 1659554835.789656081 M96_MX67C_MECLawrencevilleMain l7_firewall src=224.0.29.82 dst=207.40.19.227 protocol=tcp sport=42150 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=97.89.16.253 1 1659554835.789656081 M96_MX67C_MECLawrencevilleMain l7_firewall src=224.0.29.82 dst=207.40.19.227 protocol=tcp sport=42150 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 42150,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "224.0.29.82",
"serverIP": "207.40.19.227"
} | Create a JSON artifact from the message |
<134>Original Address=97.89.16.253 1 1659554835.789656081 M96_MX67C_MECLawrencevilleMain l7_firewall src=224.0.29.82 dst=207.40.19.227 protocol=tcp sport=42150 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=97.89.16.253 1 1659554835.789656081 M96_MX67C_MECLawrencevilleMain l7_firewall src=224.0.29.82 dst=207.40.19.227 protocol=tcp sport=42150 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 42150
protocol: 6
streamName: meraki_l7_firewall
clientIP: 224.0.29.82
serverIP: 207.40.19.227 | Explain this syslog message |
<134>Original Address=97.89.16.253 1 1659554835.789656081 M96_MX67C_MECLawrencevilleMain l7_firewall src=238.236.63.42 dst=194.57.154.19 protocol=tcp sport=42150 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=97.89.16.253 1 1659554835.789656081 M96_MX67C_MECLawrencevilleMain l7_firewall src=238.236.63.42 dst=194.57.154.19 protocol=tcp sport=42150 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 42150,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "238.236.63.42",
"serverIP": "194.57.154.19"
} | Create a JSON artifact from the message |
<134>Original Address=97.89.16.253 1 1659554835.789656081 M96_MX67C_MECLawrencevilleMain l7_firewall src=238.236.63.42 dst=194.57.154.19 protocol=tcp sport=42150 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=97.89.16.253 1 1659554835.789656081 M96_MX67C_MECLawrencevilleMain l7_firewall src=238.236.63.42 dst=194.57.154.19 protocol=tcp sport=42150 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 42150
protocol: 6
streamName: meraki_l7_firewall
clientIP: 238.236.63.42
serverIP: 194.57.154.19 | Explain this syslog message |
<134>Original Address=97.89.16.253 1 1659554835.789656081 M96_MX67C_MECLawrencevilleMain l7_firewall src=17.102.116.118 dst=125.53.250.75 protocol=tcp sport=42150 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=97.89.16.253 1 1659554835.789656081 M96_MX67C_MECLawrencevilleMain l7_firewall src=17.102.116.118 dst=125.53.250.75 protocol=tcp sport=42150 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 42150,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "17.102.116.118",
"serverIP": "125.53.250.75"
} | Create a JSON artifact from the message |
<134>Original Address=97.89.16.253 1 1659554835.789656081 M96_MX67C_MECLawrencevilleMain l7_firewall src=17.102.116.118 dst=125.53.250.75 protocol=tcp sport=42150 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=97.89.16.253 1 1659554835.789656081 M96_MX67C_MECLawrencevilleMain l7_firewall src=17.102.116.118 dst=125.53.250.75 protocol=tcp sport=42150 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 42150
protocol: 6
streamName: meraki_l7_firewall
clientIP: 17.102.116.118
serverIP: 125.53.250.75 | Explain this syslog message |
<134>Original Address=24.96.192.50 1 1688700196.179759416 M57_MX67C_PanamaCity l7_firewall src=132.87.49.147 dst=189.241.198.151 protocol=tcp sport=54617 dport=443 decision=blocked | {
"action": "block",
"clientport": 54617,
"message": "<134>Original Address=24.96.192.50 1 1688700196.179759416 M57_MX67C_PanamaCity l7_firewall src=132.87.49.147 dst=189.241.198.151 protocol=tcp sport=54617 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "132.87.49.147",
"serverIP": "189.241.198.151"
} | Create a JSON artifact from the message |
<134>Original Address=24.96.192.50 1 1688700196.179759416 M57_MX67C_PanamaCity l7_firewall src=132.87.49.147 dst=189.241.198.151 protocol=tcp sport=54617 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.96.192.50 1 1688700196.179759416 M57_MX67C_PanamaCity l7_firewall src=132.87.49.147 dst=189.241.198.151 protocol=tcp sport=54617 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 54617
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 132.87.49.147
serverIP: 189.241.198.151 | Explain this syslog message |
<134>Original Address=24.96.192.50 1 1688700196.179759416 M57_MX67C_PanamaCity l7_firewall src=87.110.154.77 dst=125.191.197.180 protocol=tcp sport=54617 dport=443 decision=blocked | {
"action": "block",
"clientport": 54617,
"message": "<134>Original Address=24.96.192.50 1 1688700196.179759416 M57_MX67C_PanamaCity l7_firewall src=87.110.154.77 dst=125.191.197.180 protocol=tcp sport=54617 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "87.110.154.77",
"serverIP": "125.191.197.180"
} | Create a JSON artifact from the message |
<134>Original Address=24.96.192.50 1 1688700196.179759416 M57_MX67C_PanamaCity l7_firewall src=87.110.154.77 dst=125.191.197.180 protocol=tcp sport=54617 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.96.192.50 1 1688700196.179759416 M57_MX67C_PanamaCity l7_firewall src=87.110.154.77 dst=125.191.197.180 protocol=tcp sport=54617 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 54617
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 87.110.154.77
serverIP: 125.191.197.180 | Explain this syslog message |
<134>Original Address=24.96.192.50 1 1688700196.179759416 M57_MX67C_PanamaCity l7_firewall src=149.193.93.4 dst=60.140.193.76 protocol=tcp sport=54617 dport=443 decision=blocked | {
"action": "block",
"clientport": 54617,
"message": "<134>Original Address=24.96.192.50 1 1688700196.179759416 M57_MX67C_PanamaCity l7_firewall src=149.193.93.4 dst=60.140.193.76 protocol=tcp sport=54617 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "149.193.93.4",
"serverIP": "60.140.193.76"
} | Create a JSON artifact from the message |
<134>Original Address=24.96.192.50 1 1688700196.179759416 M57_MX67C_PanamaCity l7_firewall src=149.193.93.4 dst=60.140.193.76 protocol=tcp sport=54617 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.96.192.50 1 1688700196.179759416 M57_MX67C_PanamaCity l7_firewall src=149.193.93.4 dst=60.140.193.76 protocol=tcp sport=54617 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 54617
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 149.193.93.4
serverIP: 60.140.193.76 | Explain this syslog message |
<134>Original Address=24.96.192.50 1 1688700196.179759416 M57_MX67C_PanamaCity l7_firewall src=46.116.80.197 dst=253.133.15.161 protocol=tcp sport=54617 dport=443 decision=blocked | {
"action": "block",
"clientport": 54617,
"message": "<134>Original Address=24.96.192.50 1 1688700196.179759416 M57_MX67C_PanamaCity l7_firewall src=46.116.80.197 dst=253.133.15.161 protocol=tcp sport=54617 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "46.116.80.197",
"serverIP": "253.133.15.161"
} | Create a JSON artifact from the message |
<134>Original Address=24.96.192.50 1 1688700196.179759416 M57_MX67C_PanamaCity l7_firewall src=46.116.80.197 dst=253.133.15.161 protocol=tcp sport=54617 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.96.192.50 1 1688700196.179759416 M57_MX67C_PanamaCity l7_firewall src=46.116.80.197 dst=253.133.15.161 protocol=tcp sport=54617 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 54617
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 46.116.80.197
serverIP: 253.133.15.161 | Explain this syslog message |
<134>Original Address=174.68.214.235 1 1688883885.961444716 M41_MX67C_Macon l7_firewall src=51.242.53.93 dst=171.71.123.138 protocol=tcp sport=64065 dport=443 decision=blocked | {
"action": "block",
"clientport": 64065,
"message": "<134>Original Address=174.68.214.235 1 1688883885.961444716 M41_MX67C_Macon l7_firewall src=51.242.53.93 dst=171.71.123.138 protocol=tcp sport=64065 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "51.242.53.93",
"serverIP": "171.71.123.138"
} | Create a JSON artifact from the message |
<134>Original Address=174.68.214.235 1 1688883885.961444716 M41_MX67C_Macon l7_firewall src=51.242.53.93 dst=171.71.123.138 protocol=tcp sport=64065 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=174.68.214.235 1 1688883885.961444716 M41_MX67C_Macon l7_firewall src=51.242.53.93 dst=171.71.123.138 protocol=tcp sport=64065 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 64065
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 51.242.53.93
serverIP: 171.71.123.138 | Explain this syslog message |
<134>Original Address=174.68.214.235 1 1688883885.961444716 M41_MX67C_Macon l7_firewall src=117.52.105.232 dst=37.162.92.28 protocol=tcp sport=64065 dport=443 decision=blocked | {
"action": "block",
"clientport": 64065,
"message": "<134>Original Address=174.68.214.235 1 1688883885.961444716 M41_MX67C_Macon l7_firewall src=117.52.105.232 dst=37.162.92.28 protocol=tcp sport=64065 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "117.52.105.232",
"serverIP": "37.162.92.28"
} | Create a JSON artifact from the message |
<134>Original Address=174.68.214.235 1 1688883885.961444716 M41_MX67C_Macon l7_firewall src=117.52.105.232 dst=37.162.92.28 protocol=tcp sport=64065 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=174.68.214.235 1 1688883885.961444716 M41_MX67C_Macon l7_firewall src=117.52.105.232 dst=37.162.92.28 protocol=tcp sport=64065 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 64065
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 117.52.105.232
serverIP: 37.162.92.28 | Explain this syslog message |
<134>Original Address=174.68.214.235 1 1688883885.961444716 M41_MX67C_Macon l7_firewall src=0.15.172.122 dst=205.250.191.232 protocol=tcp sport=64065 dport=443 decision=blocked | {
"action": "block",
"clientport": 64065,
"message": "<134>Original Address=174.68.214.235 1 1688883885.961444716 M41_MX67C_Macon l7_firewall src=0.15.172.122 dst=205.250.191.232 protocol=tcp sport=64065 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "0.15.172.122",
"serverIP": "205.250.191.232"
} | Create a JSON artifact from the message |
<134>Original Address=174.68.214.235 1 1688883885.961444716 M41_MX67C_Macon l7_firewall src=0.15.172.122 dst=205.250.191.232 protocol=tcp sport=64065 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=174.68.214.235 1 1688883885.961444716 M41_MX67C_Macon l7_firewall src=0.15.172.122 dst=205.250.191.232 protocol=tcp sport=64065 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 64065
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 0.15.172.122
serverIP: 205.250.191.232 | Explain this syslog message |
<134>Original Address=174.68.214.235 1 1688883885.961444716 M41_MX67C_Macon l7_firewall src=88.63.143.113 dst=205.149.110.96 protocol=tcp sport=64065 dport=443 decision=blocked | {
"action": "block",
"clientport": 64065,
"message": "<134>Original Address=174.68.214.235 1 1688883885.961444716 M41_MX67C_Macon l7_firewall src=88.63.143.113 dst=205.149.110.96 protocol=tcp sport=64065 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "88.63.143.113",
"serverIP": "205.149.110.96"
} | Create a JSON artifact from the message |
<134>Original Address=174.68.214.235 1 1688883885.961444716 M41_MX67C_Macon l7_firewall src=88.63.143.113 dst=205.149.110.96 protocol=tcp sport=64065 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=174.68.214.235 1 1688883885.961444716 M41_MX67C_Macon l7_firewall src=88.63.143.113 dst=205.149.110.96 protocol=tcp sport=64065 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 64065
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 88.63.143.113
serverIP: 205.149.110.96 | Explain this syslog message |
<134>Original Address=24.248.123.90 1 1662297932.854778479 M44_MX67C_WarnerRobins l7_firewall src=141.71.63.19 dst=234.202.24.132 protocol=tcp sport=58332 dport=80 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.248.123.90 1 1662297932.854778479 M44_MX67C_WarnerRobins l7_firewall src=141.71.63.19 dst=234.202.24.132 protocol=tcp sport=58332 dport=80 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 58332,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "141.71.63.19",
"serverIP": "234.202.24.132"
} | Create a JSON artifact from the message |
<134>Original Address=24.248.123.90 1 1662297932.854778479 M44_MX67C_WarnerRobins l7_firewall src=141.71.63.19 dst=234.202.24.132 protocol=tcp sport=58332 dport=80 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.248.123.90 1 1662297932.854778479 M44_MX67C_WarnerRobins l7_firewall src=141.71.63.19 dst=234.202.24.132 protocol=tcp sport=58332 dport=80 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 58332
protocol: 6
streamName: meraki_l7_firewall
clientIP: 141.71.63.19
serverIP: 234.202.24.132 | Explain this syslog message |
<134>Original Address=24.248.123.90 1 1662297932.854778479 M44_MX67C_WarnerRobins l7_firewall src=119.14.206.13 dst=159.6.32.160 protocol=tcp sport=58332 dport=80 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.248.123.90 1 1662297932.854778479 M44_MX67C_WarnerRobins l7_firewall src=119.14.206.13 dst=159.6.32.160 protocol=tcp sport=58332 dport=80 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 58332,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "119.14.206.13",
"serverIP": "159.6.32.160"
} | Create a JSON artifact from the message |
<134>Original Address=24.248.123.90 1 1662297932.854778479 M44_MX67C_WarnerRobins l7_firewall src=119.14.206.13 dst=159.6.32.160 protocol=tcp sport=58332 dport=80 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.248.123.90 1 1662297932.854778479 M44_MX67C_WarnerRobins l7_firewall src=119.14.206.13 dst=159.6.32.160 protocol=tcp sport=58332 dport=80 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 58332
protocol: 6
streamName: meraki_l7_firewall
clientIP: 119.14.206.13
serverIP: 159.6.32.160 | Explain this syslog message |
<134>Original Address=24.248.123.90 1 1662297932.854778479 M44_MX67C_WarnerRobins l7_firewall src=110.178.186.49 dst=132.32.144.226 protocol=tcp sport=58332 dport=80 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.248.123.90 1 1662297932.854778479 M44_MX67C_WarnerRobins l7_firewall src=110.178.186.49 dst=132.32.144.226 protocol=tcp sport=58332 dport=80 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 58332,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "110.178.186.49",
"serverIP": "132.32.144.226"
} | Create a JSON artifact from the message |
<134>Original Address=24.248.123.90 1 1662297932.854778479 M44_MX67C_WarnerRobins l7_firewall src=110.178.186.49 dst=132.32.144.226 protocol=tcp sport=58332 dport=80 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.248.123.90 1 1662297932.854778479 M44_MX67C_WarnerRobins l7_firewall src=110.178.186.49 dst=132.32.144.226 protocol=tcp sport=58332 dport=80 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 58332
protocol: 6
streamName: meraki_l7_firewall
clientIP: 110.178.186.49
serverIP: 132.32.144.226 | Explain this syslog message |
<134>Original Address=24.248.123.90 1 1662297932.854778479 M44_MX67C_WarnerRobins l7_firewall src=175.145.163.241 dst=186.152.81.239 protocol=tcp sport=58332 dport=80 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.248.123.90 1 1662297932.854778479 M44_MX67C_WarnerRobins l7_firewall src=175.145.163.241 dst=186.152.81.239 protocol=tcp sport=58332 dport=80 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 58332,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "175.145.163.241",
"serverIP": "186.152.81.239"
} | Create a JSON artifact from the message |
<134>Original Address=24.248.123.90 1 1662297932.854778479 M44_MX67C_WarnerRobins l7_firewall src=175.145.163.241 dst=186.152.81.239 protocol=tcp sport=58332 dport=80 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.248.123.90 1 1662297932.854778479 M44_MX67C_WarnerRobins l7_firewall src=175.145.163.241 dst=186.152.81.239 protocol=tcp sport=58332 dport=80 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 58332
protocol: 6
streamName: meraki_l7_firewall
clientIP: 175.145.163.241
serverIP: 186.152.81.239 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655206154.911421376 NORDC_MX400_1 l7_firewall src=6.7.205.93 dst=19.37.188.210 protocol=tcp sport=63426 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655206154.911421376 NORDC_MX400_1 l7_firewall src=6.7.205.93 dst=19.37.188.210 protocol=tcp sport=63426 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 63426,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "6.7.205.93",
"serverIP": "19.37.188.210"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655206154.911421376 NORDC_MX400_1 l7_firewall src=6.7.205.93 dst=19.37.188.210 protocol=tcp sport=63426 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655206154.911421376 NORDC_MX400_1 l7_firewall src=6.7.205.93 dst=19.37.188.210 protocol=tcp sport=63426 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 63426
protocol: 6
streamName: meraki_l7_firewall
clientIP: 6.7.205.93
serverIP: 19.37.188.210 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655206154.911421376 NORDC_MX400_1 l7_firewall src=96.142.139.33 dst=215.150.19.17 protocol=tcp sport=63426 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655206154.911421376 NORDC_MX400_1 l7_firewall src=96.142.139.33 dst=215.150.19.17 protocol=tcp sport=63426 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 63426,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "96.142.139.33",
"serverIP": "215.150.19.17"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655206154.911421376 NORDC_MX400_1 l7_firewall src=96.142.139.33 dst=215.150.19.17 protocol=tcp sport=63426 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655206154.911421376 NORDC_MX400_1 l7_firewall src=96.142.139.33 dst=215.150.19.17 protocol=tcp sport=63426 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 63426
protocol: 6
streamName: meraki_l7_firewall
clientIP: 96.142.139.33
serverIP: 215.150.19.17 | Explain this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.