input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
<134>Original Address=192.168.2.253 1 1655206154.911421376 NORDC_MX400_1 l7_firewall src=181.145.20.15 dst=179.149.110.119 protocol=tcp sport=63426 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655206154.911421376 NORDC_MX400_1 l7_firewall src=181.145.20.15 dst=179.149.110.119 protocol=tcp sport=63426 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 63426,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "181.145.20.15",
"serverIP": "179.149.110.119"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655206154.911421376 NORDC_MX400_1 l7_firewall src=181.145.20.15 dst=179.149.110.119 protocol=tcp sport=63426 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655206154.911421376 NORDC_MX400_1 l7_firewall src=181.145.20.15 dst=179.149.110.119 protocol=tcp sport=63426 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 63426
protocol: 6
streamName: meraki_l7_firewall
clientIP: 181.145.20.15
serverIP: 179.149.110.119 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655206154.911421376 NORDC_MX400_1 l7_firewall src=191.192.8.6 dst=84.73.105.155 protocol=tcp sport=63426 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655206154.911421376 NORDC_MX400_1 l7_firewall src=191.192.8.6 dst=84.73.105.155 protocol=tcp sport=63426 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 63426,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "191.192.8.6",
"serverIP": "84.73.105.155"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655206154.911421376 NORDC_MX400_1 l7_firewall src=191.192.8.6 dst=84.73.105.155 protocol=tcp sport=63426 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655206154.911421376 NORDC_MX400_1 l7_firewall src=191.192.8.6 dst=84.73.105.155 protocol=tcp sport=63426 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 63426
protocol: 6
streamName: meraki_l7_firewall
clientIP: 191.192.8.6
serverIP: 84.73.105.155 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655206161.632261819 NORDC_MX400_1 l7_firewall src=210.237.138.5 dst=251.201.92.255 protocol=tcp sport=52530 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655206161.632261819 NORDC_MX400_1 l7_firewall src=210.237.138.5 dst=251.201.92.255 protocol=tcp sport=52530 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 52530,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "210.237.138.5",
"serverIP": "251.201.92.255"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655206161.632261819 NORDC_MX400_1 l7_firewall src=210.237.138.5 dst=251.201.92.255 protocol=tcp sport=52530 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655206161.632261819 NORDC_MX400_1 l7_firewall src=210.237.138.5 dst=251.201.92.255 protocol=tcp sport=52530 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 52530
protocol: 6
streamName: meraki_l7_firewall
clientIP: 210.237.138.5
serverIP: 251.201.92.255 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655206161.632261819 NORDC_MX400_1 l7_firewall src=201.26.111.199 dst=97.89.72.173 protocol=tcp sport=52530 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655206161.632261819 NORDC_MX400_1 l7_firewall src=201.26.111.199 dst=97.89.72.173 protocol=tcp sport=52530 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 52530,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "201.26.111.199",
"serverIP": "97.89.72.173"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655206161.632261819 NORDC_MX400_1 l7_firewall src=201.26.111.199 dst=97.89.72.173 protocol=tcp sport=52530 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655206161.632261819 NORDC_MX400_1 l7_firewall src=201.26.111.199 dst=97.89.72.173 protocol=tcp sport=52530 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 52530
protocol: 6
streamName: meraki_l7_firewall
clientIP: 201.26.111.199
serverIP: 97.89.72.173 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655206161.632261819 NORDC_MX400_1 l7_firewall src=241.203.104.16 dst=97.247.158.118 protocol=tcp sport=52530 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655206161.632261819 NORDC_MX400_1 l7_firewall src=241.203.104.16 dst=97.247.158.118 protocol=tcp sport=52530 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 52530,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "241.203.104.16",
"serverIP": "97.247.158.118"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655206161.632261819 NORDC_MX400_1 l7_firewall src=241.203.104.16 dst=97.247.158.118 protocol=tcp sport=52530 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655206161.632261819 NORDC_MX400_1 l7_firewall src=241.203.104.16 dst=97.247.158.118 protocol=tcp sport=52530 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 52530
protocol: 6
streamName: meraki_l7_firewall
clientIP: 241.203.104.16
serverIP: 97.247.158.118 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655206161.632261819 NORDC_MX400_1 l7_firewall src=145.202.170.23 dst=199.121.232.136 protocol=tcp sport=52530 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655206161.632261819 NORDC_MX400_1 l7_firewall src=145.202.170.23 dst=199.121.232.136 protocol=tcp sport=52530 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 52530,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "145.202.170.23",
"serverIP": "199.121.232.136"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655206161.632261819 NORDC_MX400_1 l7_firewall src=145.202.170.23 dst=199.121.232.136 protocol=tcp sport=52530 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655206161.632261819 NORDC_MX400_1 l7_firewall src=145.202.170.23 dst=199.121.232.136 protocol=tcp sport=52530 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 52530
protocol: 6
streamName: meraki_l7_firewall
clientIP: 145.202.170.23
serverIP: 199.121.232.136 | Explain this syslog message |
<134>Original Address=24.216.132.210 1 1655206155.067999585 M28_MX67C_Lawrencville l7_firewall src=243.64.166.252 dst=218.7.90.81 protocol=tcp sport=57445 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.216.132.210 1 1655206155.067999585 M28_MX67C_Lawrencville l7_firewall src=243.64.166.252 dst=218.7.90.81 protocol=tcp sport=57445 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 57445,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "243.64.166.252",
"serverIP": "218.7.90.81"
} | Create a JSON artifact from the message |
<134>Original Address=24.216.132.210 1 1655206155.067999585 M28_MX67C_Lawrencville l7_firewall src=243.64.166.252 dst=218.7.90.81 protocol=tcp sport=57445 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.216.132.210 1 1655206155.067999585 M28_MX67C_Lawrencville l7_firewall src=243.64.166.252 dst=218.7.90.81 protocol=tcp sport=57445 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 57445
protocol: 6
streamName: meraki_l7_firewall
clientIP: 243.64.166.252
serverIP: 218.7.90.81 | Explain this syslog message |
<134>Original Address=24.216.132.210 1 1655206155.067999585 M28_MX67C_Lawrencville l7_firewall src=141.199.246.137 dst=54.241.1.86 protocol=tcp sport=57445 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.216.132.210 1 1655206155.067999585 M28_MX67C_Lawrencville l7_firewall src=141.199.246.137 dst=54.241.1.86 protocol=tcp sport=57445 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 57445,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "141.199.246.137",
"serverIP": "54.241.1.86"
} | Create a JSON artifact from the message |
<134>Original Address=24.216.132.210 1 1655206155.067999585 M28_MX67C_Lawrencville l7_firewall src=141.199.246.137 dst=54.241.1.86 protocol=tcp sport=57445 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.216.132.210 1 1655206155.067999585 M28_MX67C_Lawrencville l7_firewall src=141.199.246.137 dst=54.241.1.86 protocol=tcp sport=57445 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 57445
protocol: 6
streamName: meraki_l7_firewall
clientIP: 141.199.246.137
serverIP: 54.241.1.86 | Explain this syslog message |
<134>Original Address=24.216.132.210 1 1655206155.067999585 M28_MX67C_Lawrencville l7_firewall src=133.144.216.30 dst=135.78.24.61 protocol=tcp sport=57445 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.216.132.210 1 1655206155.067999585 M28_MX67C_Lawrencville l7_firewall src=133.144.216.30 dst=135.78.24.61 protocol=tcp sport=57445 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 57445,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "133.144.216.30",
"serverIP": "135.78.24.61"
} | Create a JSON artifact from the message |
<134>Original Address=24.216.132.210 1 1655206155.067999585 M28_MX67C_Lawrencville l7_firewall src=133.144.216.30 dst=135.78.24.61 protocol=tcp sport=57445 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.216.132.210 1 1655206155.067999585 M28_MX67C_Lawrencville l7_firewall src=133.144.216.30 dst=135.78.24.61 protocol=tcp sport=57445 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 57445
protocol: 6
streamName: meraki_l7_firewall
clientIP: 133.144.216.30
serverIP: 135.78.24.61 | Explain this syslog message |
<134>Original Address=24.216.132.210 1 1655206155.067999585 M28_MX67C_Lawrencville l7_firewall src=35.149.194.197 dst=120.112.251.162 protocol=tcp sport=57445 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.216.132.210 1 1655206155.067999585 M28_MX67C_Lawrencville l7_firewall src=35.149.194.197 dst=120.112.251.162 protocol=tcp sport=57445 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 57445,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "35.149.194.197",
"serverIP": "120.112.251.162"
} | Create a JSON artifact from the message |
<134>Original Address=24.216.132.210 1 1655206155.067999585 M28_MX67C_Lawrencville l7_firewall src=35.149.194.197 dst=120.112.251.162 protocol=tcp sport=57445 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.216.132.210 1 1655206155.067999585 M28_MX67C_Lawrencville l7_firewall src=35.149.194.197 dst=120.112.251.162 protocol=tcp sport=57445 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 57445
protocol: 6
streamName: meraki_l7_firewall
clientIP: 35.149.194.197
serverIP: 120.112.251.162 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661516120.709246288 NORDC_MX400_1 l7_firewall src=218.229.54.77 dst=234.248.201.128 protocol=udp sport=58133 dport=123 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 123,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661516120.709246288 NORDC_MX400_1 l7_firewall src=218.229.54.77 dst=234.248.201.128 protocol=udp sport=58133 dport=123 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 58133,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "218.229.54.77",
"serverIP": "234.248.201.128"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661516120.709246288 NORDC_MX400_1 l7_firewall src=218.229.54.77 dst=234.248.201.128 protocol=udp sport=58133 dport=123 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661516120.709246288 NORDC_MX400_1 l7_firewall src=218.229.54.77 dst=234.248.201.128 protocol=udp sport=58133 dport=123 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 123
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 58133
protocol: 17
streamName: meraki_l7_firewall
clientIP: 218.229.54.77
serverIP: 234.248.201.128 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661516120.709246288 NORDC_MX400_1 l7_firewall src=218.31.106.86 dst=35.86.68.177 protocol=udp sport=58133 dport=123 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 123,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661516120.709246288 NORDC_MX400_1 l7_firewall src=218.31.106.86 dst=35.86.68.177 protocol=udp sport=58133 dport=123 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 58133,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "218.31.106.86",
"serverIP": "35.86.68.177"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661516120.709246288 NORDC_MX400_1 l7_firewall src=218.31.106.86 dst=35.86.68.177 protocol=udp sport=58133 dport=123 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661516120.709246288 NORDC_MX400_1 l7_firewall src=218.31.106.86 dst=35.86.68.177 protocol=udp sport=58133 dport=123 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 123
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 58133
protocol: 17
streamName: meraki_l7_firewall
clientIP: 218.31.106.86
serverIP: 35.86.68.177 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661516120.709246288 NORDC_MX400_1 l7_firewall src=26.161.54.31 dst=7.177.84.92 protocol=udp sport=58133 dport=123 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 123,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661516120.709246288 NORDC_MX400_1 l7_firewall src=26.161.54.31 dst=7.177.84.92 protocol=udp sport=58133 dport=123 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 58133,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "26.161.54.31",
"serverIP": "7.177.84.92"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661516120.709246288 NORDC_MX400_1 l7_firewall src=26.161.54.31 dst=7.177.84.92 protocol=udp sport=58133 dport=123 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661516120.709246288 NORDC_MX400_1 l7_firewall src=26.161.54.31 dst=7.177.84.92 protocol=udp sport=58133 dport=123 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 123
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 58133
protocol: 17
streamName: meraki_l7_firewall
clientIP: 26.161.54.31
serverIP: 7.177.84.92 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661516120.709246288 NORDC_MX400_1 l7_firewall src=28.71.255.127 dst=154.227.181.52 protocol=udp sport=58133 dport=123 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 123,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661516120.709246288 NORDC_MX400_1 l7_firewall src=28.71.255.127 dst=154.227.181.52 protocol=udp sport=58133 dport=123 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 58133,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "28.71.255.127",
"serverIP": "154.227.181.52"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661516120.709246288 NORDC_MX400_1 l7_firewall src=28.71.255.127 dst=154.227.181.52 protocol=udp sport=58133 dport=123 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661516120.709246288 NORDC_MX400_1 l7_firewall src=28.71.255.127 dst=154.227.181.52 protocol=udp sport=58133 dport=123 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 123
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 58133
protocol: 17
streamName: meraki_l7_firewall
clientIP: 28.71.255.127
serverIP: 154.227.181.52 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661516156.711751546 NORDC_MX400_1 l7_firewall src=74.13.155.174 dst=160.51.33.146 protocol=udp sport=48050 dport=123 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 123,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661516156.711751546 NORDC_MX400_1 l7_firewall src=74.13.155.174 dst=160.51.33.146 protocol=udp sport=48050 dport=123 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 48050,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "74.13.155.174",
"serverIP": "160.51.33.146"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661516156.711751546 NORDC_MX400_1 l7_firewall src=74.13.155.174 dst=160.51.33.146 protocol=udp sport=48050 dport=123 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661516156.711751546 NORDC_MX400_1 l7_firewall src=74.13.155.174 dst=160.51.33.146 protocol=udp sport=48050 dport=123 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 123
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 48050
protocol: 17
streamName: meraki_l7_firewall
clientIP: 74.13.155.174
serverIP: 160.51.33.146 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661516156.711751546 NORDC_MX400_1 l7_firewall src=88.227.154.28 dst=195.17.126.100 protocol=udp sport=48050 dport=123 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 123,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661516156.711751546 NORDC_MX400_1 l7_firewall src=88.227.154.28 dst=195.17.126.100 protocol=udp sport=48050 dport=123 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 48050,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "88.227.154.28",
"serverIP": "195.17.126.100"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661516156.711751546 NORDC_MX400_1 l7_firewall src=88.227.154.28 dst=195.17.126.100 protocol=udp sport=48050 dport=123 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661516156.711751546 NORDC_MX400_1 l7_firewall src=88.227.154.28 dst=195.17.126.100 protocol=udp sport=48050 dport=123 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 123
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 48050
protocol: 17
streamName: meraki_l7_firewall
clientIP: 88.227.154.28
serverIP: 195.17.126.100 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661516156.711751546 NORDC_MX400_1 l7_firewall src=170.220.220.252 dst=71.236.39.210 protocol=udp sport=48050 dport=123 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 123,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661516156.711751546 NORDC_MX400_1 l7_firewall src=170.220.220.252 dst=71.236.39.210 protocol=udp sport=48050 dport=123 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 48050,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "170.220.220.252",
"serverIP": "71.236.39.210"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661516156.711751546 NORDC_MX400_1 l7_firewall src=170.220.220.252 dst=71.236.39.210 protocol=udp sport=48050 dport=123 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661516156.711751546 NORDC_MX400_1 l7_firewall src=170.220.220.252 dst=71.236.39.210 protocol=udp sport=48050 dport=123 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 123
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 48050
protocol: 17
streamName: meraki_l7_firewall
clientIP: 170.220.220.252
serverIP: 71.236.39.210 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661516156.711751546 NORDC_MX400_1 l7_firewall src=246.127.216.141 dst=78.189.63.43 protocol=udp sport=48050 dport=123 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 123,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661516156.711751546 NORDC_MX400_1 l7_firewall src=246.127.216.141 dst=78.189.63.43 protocol=udp sport=48050 dport=123 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 48050,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "246.127.216.141",
"serverIP": "78.189.63.43"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661516156.711751546 NORDC_MX400_1 l7_firewall src=246.127.216.141 dst=78.189.63.43 protocol=udp sport=48050 dport=123 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661516156.711751546 NORDC_MX400_1 l7_firewall src=246.127.216.141 dst=78.189.63.43 protocol=udp sport=48050 dport=123 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 123
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 48050
protocol: 17
streamName: meraki_l7_firewall
clientIP: 246.127.216.141
serverIP: 78.189.63.43 | Explain this syslog message |
<134>Original Address=96.86.241.61 1 1685916706.241560758 H171_MX67C_HoldenPTC l7_firewall src=240.190.227.103 dst=55.51.11.158 protocol=udp sport=29298 dport=32100 decision=blocked | {
"action": "block",
"clientport": 32100,
"message": "<134>Original Address=96.86.241.61 1 1685916706.241560758 H171_MX67C_HoldenPTC l7_firewall src=240.190.227.103 dst=55.51.11.158 protocol=udp sport=29298 dport=32100 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 29298,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "55.51.11.158",
"serverIP": "240.190.227.103"
} | Create a JSON artifact from the message |
<134>Original Address=96.86.241.61 1 1685916706.241560758 H171_MX67C_HoldenPTC l7_firewall src=240.190.227.103 dst=55.51.11.158 protocol=udp sport=29298 dport=32100 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.86.241.61 1 1685916706.241560758 H171_MX67C_HoldenPTC l7_firewall src=240.190.227.103 dst=55.51.11.158 protocol=udp sport=29298 dport=32100 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 32100
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 29298
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 55.51.11.158
serverIP: 240.190.227.103 | Explain this syslog message |
<134>Original Address=96.86.241.61 1 1685916706.241560758 H171_MX67C_HoldenPTC l7_firewall src=45.61.22.74 dst=87.204.95.198 protocol=udp sport=29298 dport=32100 decision=blocked | {
"action": "block",
"clientport": 32100,
"message": "<134>Original Address=96.86.241.61 1 1685916706.241560758 H171_MX67C_HoldenPTC l7_firewall src=45.61.22.74 dst=87.204.95.198 protocol=udp sport=29298 dport=32100 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 29298,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "87.204.95.198",
"serverIP": "45.61.22.74"
} | Create a JSON artifact from the message |
<134>Original Address=96.86.241.61 1 1685916706.241560758 H171_MX67C_HoldenPTC l7_firewall src=45.61.22.74 dst=87.204.95.198 protocol=udp sport=29298 dport=32100 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.86.241.61 1 1685916706.241560758 H171_MX67C_HoldenPTC l7_firewall src=45.61.22.74 dst=87.204.95.198 protocol=udp sport=29298 dport=32100 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 32100
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 29298
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 87.204.95.198
serverIP: 45.61.22.74 | Explain this syslog message |
<134>Original Address=96.86.241.61 1 1685916706.241560758 H171_MX67C_HoldenPTC l7_firewall src=182.192.167.165 dst=208.239.252.49 protocol=udp sport=29298 dport=32100 decision=blocked | {
"action": "block",
"clientport": 32100,
"message": "<134>Original Address=96.86.241.61 1 1685916706.241560758 H171_MX67C_HoldenPTC l7_firewall src=182.192.167.165 dst=208.239.252.49 protocol=udp sport=29298 dport=32100 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 29298,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "208.239.252.49",
"serverIP": "182.192.167.165"
} | Create a JSON artifact from the message |
<134>Original Address=96.86.241.61 1 1685916706.241560758 H171_MX67C_HoldenPTC l7_firewall src=182.192.167.165 dst=208.239.252.49 protocol=udp sport=29298 dport=32100 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.86.241.61 1 1685916706.241560758 H171_MX67C_HoldenPTC l7_firewall src=182.192.167.165 dst=208.239.252.49 protocol=udp sport=29298 dport=32100 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 32100
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 29298
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 208.239.252.49
serverIP: 182.192.167.165 | Explain this syslog message |
<134>Original Address=96.86.241.61 1 1685916706.241560758 H171_MX67C_HoldenPTC l7_firewall src=140.100.252.74 dst=245.251.219.127 protocol=udp sport=29298 dport=32100 decision=blocked | {
"action": "block",
"clientport": 32100,
"message": "<134>Original Address=96.86.241.61 1 1685916706.241560758 H171_MX67C_HoldenPTC l7_firewall src=140.100.252.74 dst=245.251.219.127 protocol=udp sport=29298 dport=32100 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 29298,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "245.251.219.127",
"serverIP": "140.100.252.74"
} | Create a JSON artifact from the message |
<134>Original Address=96.86.241.61 1 1685916706.241560758 H171_MX67C_HoldenPTC l7_firewall src=140.100.252.74 dst=245.251.219.127 protocol=udp sport=29298 dport=32100 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.86.241.61 1 1685916706.241560758 H171_MX67C_HoldenPTC l7_firewall src=140.100.252.74 dst=245.251.219.127 protocol=udp sport=29298 dport=32100 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 32100
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 29298
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 245.251.219.127
serverIP: 140.100.252.74 | Explain this syslog message |
<185>Oct 17 20:33:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=123.111.18.70 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=214.53.178.130 spt=13152 requestMethod=GET app=TLSv1.2 requestContext="-" start=Oct 17 2023 20:33:40 rt=1697592820043 request=/ requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 13_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18b406ac120-436273c4 cn2=13152 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=214.53.178.130 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 13152,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1697592820043 ",
"message": "<185>Oct 17 20:33:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=123.111.18.70 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=214.53.178.130 spt=13152 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Oct 17 2023 20:33:40 rt=1697592820043 request=/ requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 13_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36\" dvchost=WAFirewall externalId=18b406ac120-436273c4 cn2=13152 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=214.53.178.130 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"ProxyIP:45.79.172.21",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "214.53.178.130",
"serverIP": "123.111.18.70",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 17 20:33:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=123.111.18.70 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=214.53.178.130 spt=13152 requestMethod=GET app=TLSv1.2 requestContext="-" start=Oct 17 2023 20:33:40 rt=1697592820043 request=/ requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 13_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18b406ac120-436273c4 cn2=13152 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=214.53.178.130 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 17 20:33:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=123.111.18.70 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=214.53.178.130 spt=13152 requestMethod=GET app=TLSv1.2 requestContext="-" start=Oct 17 2023 20:33:40 rt=1697592820043 request=/ requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 13_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18b406ac120-436273c4 cn2=13152 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=214.53.178.130 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 13152
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1697592820043
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'ProxyIP:45.79.172.21', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 214.53.178.130
serverIP: 123.111.18.70
userName: - | Explain this syslog message |
<185>Oct 17 20:33:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=72.145.92.222 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=78.156.195.214 spt=13152 requestMethod=GET app=TLSv1.2 requestContext="-" start=Oct 17 2023 20:33:40 rt=1697592820043 request=/ requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 13_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18b406ac120-436273c4 cn2=13152 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=78.156.195.214 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 13152,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/",
"localhostname": "WAFirewall",
"localstarttime": "1697592820043 ",
"message": "<185>Oct 17 20:33:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=72.145.92.222 dpt=443 act=DENY msg=[Known SSH Attack Source] duser=\"-\" src=78.156.195.214 spt=13152 requestMethod=GET app=TLSv1.2 requestContext=\"-\" start=Oct 17 2023 20:33:40 rt=1697592820043 request=/ requestClientApplication=\"Mozilla/5.0 (Macintosh; Intel Mac OS X 13_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36\" dvchost=WAFirewall externalId=18b406ac120-436273c4 cn2=13152 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=78.156.195.214 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"ProxyIP:45.79.172.21",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "78.156.195.214",
"serverIP": "72.145.92.222",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Oct 17 20:33:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=72.145.92.222 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=78.156.195.214 spt=13152 requestMethod=GET app=TLSv1.2 requestContext="-" start=Oct 17 2023 20:33:40 rt=1697592820043 request=/ requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 13_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18b406ac120-436273c4 cn2=13152 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=78.156.195.214 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Oct 17 20:33:40 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=72.145.92.222 dpt=443 act=DENY msg=[Known SSH Attack Source] duser="-" src=78.156.195.214 spt=13152 requestMethod=GET app=TLSv1.2 requestContext="-" start=Oct 17 2023 20:33:40 rt=1697592820043 request=/ requestClientApplication="Mozilla/5.0 (Macintosh; Intel Mac OS X 13_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36" dvchost=WAFirewall externalId=18b406ac120-436273c4 cn2=13152 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=78.156.195.214 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 13152
facilitycode: 23
facilitylabel: local7
fqdn: /
localhostname: WAFirewall
localstarttime: 1697592820043
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'ProxyIP:45.79.172.21', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 78.156.195.214
serverIP: 72.145.92.222
userName: - | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655207048.423428597 NORDC_MX400_1 l7_firewall src=101.80.114.144 dst=201.151.122.59 protocol=tcp sport=49570 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655207048.423428597 NORDC_MX400_1 l7_firewall src=101.80.114.144 dst=201.151.122.59 protocol=tcp sport=49570 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 49570,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "101.80.114.144",
"serverIP": "201.151.122.59"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655207048.423428597 NORDC_MX400_1 l7_firewall src=101.80.114.144 dst=201.151.122.59 protocol=tcp sport=49570 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655207048.423428597 NORDC_MX400_1 l7_firewall src=101.80.114.144 dst=201.151.122.59 protocol=tcp sport=49570 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 49570
protocol: 6
streamName: meraki_l7_firewall
clientIP: 101.80.114.144
serverIP: 201.151.122.59 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655207048.423428597 NORDC_MX400_1 l7_firewall src=111.18.118.16 dst=75.39.84.136 protocol=tcp sport=49570 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655207048.423428597 NORDC_MX400_1 l7_firewall src=111.18.118.16 dst=75.39.84.136 protocol=tcp sport=49570 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 49570,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "111.18.118.16",
"serverIP": "75.39.84.136"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655207048.423428597 NORDC_MX400_1 l7_firewall src=111.18.118.16 dst=75.39.84.136 protocol=tcp sport=49570 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655207048.423428597 NORDC_MX400_1 l7_firewall src=111.18.118.16 dst=75.39.84.136 protocol=tcp sport=49570 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 49570
protocol: 6
streamName: meraki_l7_firewall
clientIP: 111.18.118.16
serverIP: 75.39.84.136 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655207048.423428597 NORDC_MX400_1 l7_firewall src=236.213.188.187 dst=9.24.17.69 protocol=tcp sport=49570 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655207048.423428597 NORDC_MX400_1 l7_firewall src=236.213.188.187 dst=9.24.17.69 protocol=tcp sport=49570 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 49570,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "236.213.188.187",
"serverIP": "9.24.17.69"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655207048.423428597 NORDC_MX400_1 l7_firewall src=236.213.188.187 dst=9.24.17.69 protocol=tcp sport=49570 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655207048.423428597 NORDC_MX400_1 l7_firewall src=236.213.188.187 dst=9.24.17.69 protocol=tcp sport=49570 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 49570
protocol: 6
streamName: meraki_l7_firewall
clientIP: 236.213.188.187
serverIP: 9.24.17.69 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655207048.423428597 NORDC_MX400_1 l7_firewall src=68.197.85.212 dst=139.58.157.57 protocol=tcp sport=49570 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655207048.423428597 NORDC_MX400_1 l7_firewall src=68.197.85.212 dst=139.58.157.57 protocol=tcp sport=49570 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 49570,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "68.197.85.212",
"serverIP": "139.58.157.57"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655207048.423428597 NORDC_MX400_1 l7_firewall src=68.197.85.212 dst=139.58.157.57 protocol=tcp sport=49570 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655207048.423428597 NORDC_MX400_1 l7_firewall src=68.197.85.212 dst=139.58.157.57 protocol=tcp sport=49570 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 49570
protocol: 6
streamName: meraki_l7_firewall
clientIP: 68.197.85.212
serverIP: 139.58.157.57 | Explain this syslog message |
<134>Original Address=10.11.22.1 1 1655141845.152620156 M22_MX67C_Marietta l7_firewall src=103.200.228.221 dst=176.95.19.136 protocol=tcp sport=60855 dport=80 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=10.11.22.1 1 1655141845.152620156 M22_MX67C_Marietta l7_firewall src=103.200.228.221 dst=176.95.19.136 protocol=tcp sport=60855 dport=80 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 60855,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "103.200.228.221",
"serverIP": "176.95.19.136"
} | Create a JSON artifact from the message |
<134>Original Address=10.11.22.1 1 1655141845.152620156 M22_MX67C_Marietta l7_firewall src=103.200.228.221 dst=176.95.19.136 protocol=tcp sport=60855 dport=80 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=10.11.22.1 1 1655141845.152620156 M22_MX67C_Marietta l7_firewall src=103.200.228.221 dst=176.95.19.136 protocol=tcp sport=60855 dport=80 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 60855
protocol: 6
streamName: meraki_l7_firewall
clientIP: 103.200.228.221
serverIP: 176.95.19.136 | Explain this syslog message |
<134>Original Address=10.11.22.1 1 1655141845.152620156 M22_MX67C_Marietta l7_firewall src=123.117.230.29 dst=218.220.251.112 protocol=tcp sport=60855 dport=80 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=10.11.22.1 1 1655141845.152620156 M22_MX67C_Marietta l7_firewall src=123.117.230.29 dst=218.220.251.112 protocol=tcp sport=60855 dport=80 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 60855,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "123.117.230.29",
"serverIP": "218.220.251.112"
} | Create a JSON artifact from the message |
<134>Original Address=10.11.22.1 1 1655141845.152620156 M22_MX67C_Marietta l7_firewall src=123.117.230.29 dst=218.220.251.112 protocol=tcp sport=60855 dport=80 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=10.11.22.1 1 1655141845.152620156 M22_MX67C_Marietta l7_firewall src=123.117.230.29 dst=218.220.251.112 protocol=tcp sport=60855 dport=80 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 60855
protocol: 6
streamName: meraki_l7_firewall
clientIP: 123.117.230.29
serverIP: 218.220.251.112 | Explain this syslog message |
<134>Original Address=10.11.22.1 1 1655141845.152620156 M22_MX67C_Marietta l7_firewall src=246.24.4.249 dst=166.145.246.52 protocol=tcp sport=60855 dport=80 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=10.11.22.1 1 1655141845.152620156 M22_MX67C_Marietta l7_firewall src=246.24.4.249 dst=166.145.246.52 protocol=tcp sport=60855 dport=80 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 60855,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "246.24.4.249",
"serverIP": "166.145.246.52"
} | Create a JSON artifact from the message |
<134>Original Address=10.11.22.1 1 1655141845.152620156 M22_MX67C_Marietta l7_firewall src=246.24.4.249 dst=166.145.246.52 protocol=tcp sport=60855 dport=80 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=10.11.22.1 1 1655141845.152620156 M22_MX67C_Marietta l7_firewall src=246.24.4.249 dst=166.145.246.52 protocol=tcp sport=60855 dport=80 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 60855
protocol: 6
streamName: meraki_l7_firewall
clientIP: 246.24.4.249
serverIP: 166.145.246.52 | Explain this syslog message |
<134>Original Address=10.11.22.1 1 1655141845.152620156 M22_MX67C_Marietta l7_firewall src=222.0.254.202 dst=194.149.29.11 protocol=tcp sport=60855 dport=80 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=10.11.22.1 1 1655141845.152620156 M22_MX67C_Marietta l7_firewall src=222.0.254.202 dst=194.149.29.11 protocol=tcp sport=60855 dport=80 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 60855,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "222.0.254.202",
"serverIP": "194.149.29.11"
} | Create a JSON artifact from the message |
<134>Original Address=10.11.22.1 1 1655141845.152620156 M22_MX67C_Marietta l7_firewall src=222.0.254.202 dst=194.149.29.11 protocol=tcp sport=60855 dport=80 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=10.11.22.1 1 1655141845.152620156 M22_MX67C_Marietta l7_firewall src=222.0.254.202 dst=194.149.29.11 protocol=tcp sport=60855 dport=80 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 60855
protocol: 6
streamName: meraki_l7_firewall
clientIP: 222.0.254.202
serverIP: 194.149.29.11 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660228421.592943230 NORDC_MX400_1 l7_firewall src=110.227.14.188 dst=56.211.27.251 protocol=tcp sport=57163 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660228421.592943230 NORDC_MX400_1 l7_firewall src=110.227.14.188 dst=56.211.27.251 protocol=tcp sport=57163 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 57163,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "110.227.14.188",
"serverIP": "56.211.27.251"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660228421.592943230 NORDC_MX400_1 l7_firewall src=110.227.14.188 dst=56.211.27.251 protocol=tcp sport=57163 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660228421.592943230 NORDC_MX400_1 l7_firewall src=110.227.14.188 dst=56.211.27.251 protocol=tcp sport=57163 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 57163
protocol: 6
streamName: meraki_l7_firewall
clientIP: 110.227.14.188
serverIP: 56.211.27.251 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660228421.592943230 NORDC_MX400_1 l7_firewall src=118.129.65.16 dst=142.166.115.238 protocol=tcp sport=57163 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660228421.592943230 NORDC_MX400_1 l7_firewall src=118.129.65.16 dst=142.166.115.238 protocol=tcp sport=57163 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 57163,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "118.129.65.16",
"serverIP": "142.166.115.238"
} | Create a JSON artifact from the message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.