input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
<134>Original Address=192.168.2.253 1 1660228421.592943230 NORDC_MX400_1 l7_firewall src=118.129.65.16 dst=142.166.115.238 protocol=tcp sport=57163 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660228421.592943230 NORDC_MX400_1 l7_firewall src=118.129.65.16 dst=142.166.115.238 protocol=tcp sport=57163 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 57163
protocol: 6
streamName: meraki_l7_firewall
clientIP: 118.129.65.16
serverIP: 142.166.115.238 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660228421.592943230 NORDC_MX400_1 l7_firewall src=240.174.221.79 dst=35.59.168.108 protocol=tcp sport=57163 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660228421.592943230 NORDC_MX400_1 l7_firewall src=240.174.221.79 dst=35.59.168.108 protocol=tcp sport=57163 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 57163,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "240.174.221.79",
"serverIP": "35.59.168.108"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660228421.592943230 NORDC_MX400_1 l7_firewall src=240.174.221.79 dst=35.59.168.108 protocol=tcp sport=57163 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660228421.592943230 NORDC_MX400_1 l7_firewall src=240.174.221.79 dst=35.59.168.108 protocol=tcp sport=57163 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 57163
protocol: 6
streamName: meraki_l7_firewall
clientIP: 240.174.221.79
serverIP: 35.59.168.108 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1660228421.592943230 NORDC_MX400_1 l7_firewall src=43.168.132.44 dst=109.123.163.136 protocol=tcp sport=57163 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1660228421.592943230 NORDC_MX400_1 l7_firewall src=43.168.132.44 dst=109.123.163.136 protocol=tcp sport=57163 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 57163,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "43.168.132.44",
"serverIP": "109.123.163.136"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1660228421.592943230 NORDC_MX400_1 l7_firewall src=43.168.132.44 dst=109.123.163.136 protocol=tcp sport=57163 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1660228421.592943230 NORDC_MX400_1 l7_firewall src=43.168.132.44 dst=109.123.163.136 protocol=tcp sport=57163 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 57163
protocol: 6
streamName: meraki_l7_firewall
clientIP: 43.168.132.44
serverIP: 109.123.163.136 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1688514805.664522248 NORDC_MX400_1 l7_firewall src=152.45.78.35 dst=54.75.215.69 protocol=tcp sport=443 dport=54750 decision=blocked | {
"action": "block",
"clientport": 54750,
"message": "<134>Original Address=192.168.2.253 1 1688514805.664522248 NORDC_MX400_1 l7_firewall src=152.45.78.35 dst=54.75.215.69 protocol=tcp sport=443 dport=54750 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "54.75.215.69",
"serverIP": "152.45.78.35"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1688514805.664522248 NORDC_MX400_1 l7_firewall src=152.45.78.35 dst=54.75.215.69 protocol=tcp sport=443 dport=54750 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1688514805.664522248 NORDC_MX400_1 l7_firewall src=152.45.78.35 dst=54.75.215.69 protocol=tcp sport=443 dport=54750 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 54750
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 54.75.215.69
serverIP: 152.45.78.35 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1688514805.664522248 NORDC_MX400_1 l7_firewall src=152.183.202.68 dst=178.70.192.1 protocol=tcp sport=443 dport=54750 decision=blocked | {
"action": "block",
"clientport": 54750,
"message": "<134>Original Address=192.168.2.253 1 1688514805.664522248 NORDC_MX400_1 l7_firewall src=152.183.202.68 dst=178.70.192.1 protocol=tcp sport=443 dport=54750 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "178.70.192.1",
"serverIP": "152.183.202.68"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1688514805.664522248 NORDC_MX400_1 l7_firewall src=152.183.202.68 dst=178.70.192.1 protocol=tcp sport=443 dport=54750 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1688514805.664522248 NORDC_MX400_1 l7_firewall src=152.183.202.68 dst=178.70.192.1 protocol=tcp sport=443 dport=54750 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 54750
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 178.70.192.1
serverIP: 152.183.202.68 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1688514805.664522248 NORDC_MX400_1 l7_firewall src=59.161.175.148 dst=245.158.207.31 protocol=tcp sport=443 dport=54750 decision=blocked | {
"action": "block",
"clientport": 54750,
"message": "<134>Original Address=192.168.2.253 1 1688514805.664522248 NORDC_MX400_1 l7_firewall src=59.161.175.148 dst=245.158.207.31 protocol=tcp sport=443 dport=54750 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "245.158.207.31",
"serverIP": "59.161.175.148"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1688514805.664522248 NORDC_MX400_1 l7_firewall src=59.161.175.148 dst=245.158.207.31 protocol=tcp sport=443 dport=54750 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1688514805.664522248 NORDC_MX400_1 l7_firewall src=59.161.175.148 dst=245.158.207.31 protocol=tcp sport=443 dport=54750 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 54750
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 245.158.207.31
serverIP: 59.161.175.148 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1688514805.664522248 NORDC_MX400_1 l7_firewall src=171.149.166.221 dst=119.24.168.7 protocol=tcp sport=443 dport=54750 decision=blocked | {
"action": "block",
"clientport": 54750,
"message": "<134>Original Address=192.168.2.253 1 1688514805.664522248 NORDC_MX400_1 l7_firewall src=171.149.166.221 dst=119.24.168.7 protocol=tcp sport=443 dport=54750 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "119.24.168.7",
"serverIP": "171.149.166.221"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1688514805.664522248 NORDC_MX400_1 l7_firewall src=171.149.166.221 dst=119.24.168.7 protocol=tcp sport=443 dport=54750 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1688514805.664522248 NORDC_MX400_1 l7_firewall src=171.149.166.221 dst=119.24.168.7 protocol=tcp sport=443 dport=54750 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 54750
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 119.24.168.7
serverIP: 171.149.166.221 | Explain this syslog message |
<134>Original Address=173.235.41.202 1 1689769128.984499679 M55_MX67C_Hattiesburg l7_firewall src=238.64.132.98 dst=165.80.44.82 protocol=tcp sport=54082 dport=443 decision=blocked | {
"action": "block",
"clientport": 54082,
"message": "<134>Original Address=173.235.41.202 1 1689769128.984499679 M55_MX67C_Hattiesburg l7_firewall src=238.64.132.98 dst=165.80.44.82 protocol=tcp sport=54082 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "238.64.132.98",
"serverIP": "165.80.44.82"
} | Create a JSON artifact from the message |
<134>Original Address=173.235.41.202 1 1689769128.984499679 M55_MX67C_Hattiesburg l7_firewall src=238.64.132.98 dst=165.80.44.82 protocol=tcp sport=54082 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=173.235.41.202 1 1689769128.984499679 M55_MX67C_Hattiesburg l7_firewall src=238.64.132.98 dst=165.80.44.82 protocol=tcp sport=54082 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 54082
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 238.64.132.98
serverIP: 165.80.44.82 | Explain this syslog message |
<134>Original Address=173.235.41.202 1 1689769128.984499679 M55_MX67C_Hattiesburg l7_firewall src=218.253.196.232 dst=149.59.187.168 protocol=tcp sport=54082 dport=443 decision=blocked | {
"action": "block",
"clientport": 54082,
"message": "<134>Original Address=173.235.41.202 1 1689769128.984499679 M55_MX67C_Hattiesburg l7_firewall src=218.253.196.232 dst=149.59.187.168 protocol=tcp sport=54082 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "218.253.196.232",
"serverIP": "149.59.187.168"
} | Create a JSON artifact from the message |
<134>Original Address=173.235.41.202 1 1689769128.984499679 M55_MX67C_Hattiesburg l7_firewall src=218.253.196.232 dst=149.59.187.168 protocol=tcp sport=54082 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=173.235.41.202 1 1689769128.984499679 M55_MX67C_Hattiesburg l7_firewall src=218.253.196.232 dst=149.59.187.168 protocol=tcp sport=54082 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 54082
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 218.253.196.232
serverIP: 149.59.187.168 | Explain this syslog message |
<134>Original Address=173.235.41.202 1 1689769128.984499679 M55_MX67C_Hattiesburg l7_firewall src=15.106.161.184 dst=30.40.146.53 protocol=tcp sport=54082 dport=443 decision=blocked | {
"action": "block",
"clientport": 54082,
"message": "<134>Original Address=173.235.41.202 1 1689769128.984499679 M55_MX67C_Hattiesburg l7_firewall src=15.106.161.184 dst=30.40.146.53 protocol=tcp sport=54082 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "15.106.161.184",
"serverIP": "30.40.146.53"
} | Create a JSON artifact from the message |
<134>Original Address=173.235.41.202 1 1689769128.984499679 M55_MX67C_Hattiesburg l7_firewall src=15.106.161.184 dst=30.40.146.53 protocol=tcp sport=54082 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=173.235.41.202 1 1689769128.984499679 M55_MX67C_Hattiesburg l7_firewall src=15.106.161.184 dst=30.40.146.53 protocol=tcp sport=54082 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 54082
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 15.106.161.184
serverIP: 30.40.146.53 | Explain this syslog message |
<134>Original Address=173.235.41.202 1 1689769128.984499679 M55_MX67C_Hattiesburg l7_firewall src=200.52.61.213 dst=97.189.51.14 protocol=tcp sport=54082 dport=443 decision=blocked | {
"action": "block",
"clientport": 54082,
"message": "<134>Original Address=173.235.41.202 1 1689769128.984499679 M55_MX67C_Hattiesburg l7_firewall src=200.52.61.213 dst=97.189.51.14 protocol=tcp sport=54082 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "200.52.61.213",
"serverIP": "97.189.51.14"
} | Create a JSON artifact from the message |
<134>Original Address=173.235.41.202 1 1689769128.984499679 M55_MX67C_Hattiesburg l7_firewall src=200.52.61.213 dst=97.189.51.14 protocol=tcp sport=54082 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=173.235.41.202 1 1689769128.984499679 M55_MX67C_Hattiesburg l7_firewall src=200.52.61.213 dst=97.189.51.14 protocol=tcp sport=54082 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 54082
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 200.52.61.213
serverIP: 97.189.51.14 | Explain this syslog message |
<185>Nov 17 07:06:22 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=44.151.66.150 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=27.216.252.80 spt=43790 requestMethod=GET app=TLSv1.3 requestContext="-" start=Nov 17 2023 07:06:22 rt=1700226382220 request=/nfkt/p/ requestClientApplication="Mozilla/5.0" dvchost=WAFirewall externalId=18bdd63b98c-a645d8e1 cn2=43790 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=27.216.252.80 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 43790,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/nfkt/p/",
"localhostname": "WAFirewall",
"localstarttime": "1700226382220 ",
"message": "<185>Nov 17 07:06:22 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=44.151.66.150 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=27.216.252.80 spt=43790 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Nov 17 2023 07:06:22 rt=1700226382220 request=/nfkt/p/ requestClientApplication=\"Mozilla/5.0\" dvchost=WAFirewall externalId=18bdd63b98c-a645d8e1 cn2=43790 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=27.216.252.80 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:80.82.78.39",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "27.216.252.80",
"serverIP": "44.151.66.150",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 17 07:06:22 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=44.151.66.150 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=27.216.252.80 spt=43790 requestMethod=GET app=TLSv1.3 requestContext="-" start=Nov 17 2023 07:06:22 rt=1700226382220 request=/nfkt/p/ requestClientApplication="Mozilla/5.0" dvchost=WAFirewall externalId=18bdd63b98c-a645d8e1 cn2=43790 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=27.216.252.80 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 17 07:06:22 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=44.151.66.150 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=27.216.252.80 spt=43790 requestMethod=GET app=TLSv1.3 requestContext="-" start=Nov 17 2023 07:06:22 rt=1700226382220 request=/nfkt/p/ requestClientApplication="Mozilla/5.0" dvchost=WAFirewall externalId=18bdd63b98c-a645d8e1 cn2=43790 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=27.216.252.80 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 43790
facilitycode: 23
facilitylabel: local7
fqdn: /nfkt/p/
localhostname: WAFirewall
localstarttime: 1700226382220
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:80.82.78.39', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 27.216.252.80
serverIP: 44.151.66.150
userName: - | Explain this syslog message |
<185>Nov 17 07:06:22 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=135.143.214.141 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=157.20.237.103 spt=43790 requestMethod=GET app=TLSv1.3 requestContext="-" start=Nov 17 2023 07:06:22 rt=1700226382220 request=/nfkt/p/ requestClientApplication="Mozilla/5.0" dvchost=WAFirewall externalId=18bdd63b98c-a645d8e1 cn2=43790 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=157.20.237.103 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"action": "block",
"clientport": 43790,
"facilitycode": 23,
"facilitylabel": "local7",
"fqdn": "/nfkt/p/",
"localhostname": "WAFirewall",
"localstarttime": "1700226382220 ",
"message": "<185>Nov 17 07:06:22 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=135.143.214.141 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=157.20.237.103 spt=43790 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Nov 17 2023 07:06:22 rt=1700226382220 request=/nfkt/p/ requestClientApplication=\"Mozilla/5.0\" dvchost=WAFirewall externalId=18bdd63b98c-a645d8e1 cn2=43790 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=157.20.237.103 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"messagetype": "GEO_IP_BLOCK",
"priority": 185,
"senderhost": "10.0.0.250",
"sensitivity": "normal",
"serverport": 443,
"severitycode": 9,
"severitylabel": "alert",
"sourceinfo": "unknown",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"ProxyIP:80.82.78.39",
"SessionID:-",
"FollowUpAction:NONE"
],
"vendorcode": "342",
"streamName": "barracuda_waf",
"clientIP": "157.20.237.103",
"serverIP": "135.143.214.141",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Nov 17 07:06:22 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=135.143.214.141 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=157.20.237.103 spt=43790 requestMethod=GET app=TLSv1.3 requestContext="-" start=Nov 17 2023 07:06:22 rt=1700226382220 request=/nfkt/p/ requestClientApplication="Mozilla/5.0" dvchost=WAFirewall externalId=18bdd63b98c-a645d8e1 cn2=43790 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=157.20.237.103 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Nov 17 07:06:22 WAFirewall CEF:0|Barracuda|WAF|1210|342|GEO_IP_BLOCK|1|cat=WF dst=135.143.214.141 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=157.20.237.103 spt=43790 requestMethod=GET app=TLSv1.3 requestContext="-" start=Nov 17 2023 07:06:22 rt=1700226382220 request=/nfkt/p/ requestClientApplication="Mozilla/5.0" dvchost=WAFirewall externalId=18bdd63b98c-a645d8e1 cn2=43790 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=157.20.237.103 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
action: block
clientport: 43790
facilitycode: 23
facilitylabel: local7
fqdn: /nfkt/p/
localhostname: WAFirewall
localstarttime: 1700226382220
messagetype: GEO_IP_BLOCK
priority: 185
senderhost: 10.0.0.250
sensitivity: normal
serverport: 443
severitycode: 9
severitylabel: alert
sourceinfo: unknown
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'ProxyIP:80.82.78.39', 'SessionID:-', 'FollowUpAction:NONE']
vendorcode: 342
streamName: barracuda_waf
clientIP: 157.20.237.103
serverIP: 135.143.214.141
userName: - | Explain this syslog message |
<134>Original Address=174.68.214.235 1 1685733711.670324469 M41_MX67C_Macon l7_firewall src=107.190.81.73 dst=192.48.74.129 protocol=tcp sport=50526 dport=443 decision=blocked | {
"action": "block",
"clientport": 50526,
"message": "<134>Original Address=174.68.214.235 1 1685733711.670324469 M41_MX67C_Macon l7_firewall src=107.190.81.73 dst=192.48.74.129 protocol=tcp sport=50526 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "107.190.81.73",
"serverIP": "192.48.74.129"
} | Create a JSON artifact from the message |
<134>Original Address=174.68.214.235 1 1685733711.670324469 M41_MX67C_Macon l7_firewall src=107.190.81.73 dst=192.48.74.129 protocol=tcp sport=50526 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=174.68.214.235 1 1685733711.670324469 M41_MX67C_Macon l7_firewall src=107.190.81.73 dst=192.48.74.129 protocol=tcp sport=50526 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 50526
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 107.190.81.73
serverIP: 192.48.74.129 | Explain this syslog message |
<134>Original Address=174.68.214.235 1 1685733711.670324469 M41_MX67C_Macon l7_firewall src=153.113.166.105 dst=138.98.26.219 protocol=tcp sport=50526 dport=443 decision=blocked | {
"action": "block",
"clientport": 50526,
"message": "<134>Original Address=174.68.214.235 1 1685733711.670324469 M41_MX67C_Macon l7_firewall src=153.113.166.105 dst=138.98.26.219 protocol=tcp sport=50526 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "153.113.166.105",
"serverIP": "138.98.26.219"
} | Create a JSON artifact from the message |
<134>Original Address=174.68.214.235 1 1685733711.670324469 M41_MX67C_Macon l7_firewall src=153.113.166.105 dst=138.98.26.219 protocol=tcp sport=50526 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=174.68.214.235 1 1685733711.670324469 M41_MX67C_Macon l7_firewall src=153.113.166.105 dst=138.98.26.219 protocol=tcp sport=50526 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 50526
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 153.113.166.105
serverIP: 138.98.26.219 | Explain this syslog message |
<134>Original Address=174.68.214.235 1 1685733711.670324469 M41_MX67C_Macon l7_firewall src=16.249.38.35 dst=6.6.137.94 protocol=tcp sport=50526 dport=443 decision=blocked | {
"action": "block",
"clientport": 50526,
"message": "<134>Original Address=174.68.214.235 1 1685733711.670324469 M41_MX67C_Macon l7_firewall src=16.249.38.35 dst=6.6.137.94 protocol=tcp sport=50526 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "16.249.38.35",
"serverIP": "6.6.137.94"
} | Create a JSON artifact from the message |
<134>Original Address=174.68.214.235 1 1685733711.670324469 M41_MX67C_Macon l7_firewall src=16.249.38.35 dst=6.6.137.94 protocol=tcp sport=50526 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=174.68.214.235 1 1685733711.670324469 M41_MX67C_Macon l7_firewall src=16.249.38.35 dst=6.6.137.94 protocol=tcp sport=50526 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 50526
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 16.249.38.35
serverIP: 6.6.137.94 | Explain this syslog message |
<134>Original Address=174.68.214.235 1 1685733711.670324469 M41_MX67C_Macon l7_firewall src=155.189.161.43 dst=211.84.1.69 protocol=tcp sport=50526 dport=443 decision=blocked | {
"action": "block",
"clientport": 50526,
"message": "<134>Original Address=174.68.214.235 1 1685733711.670324469 M41_MX67C_Macon l7_firewall src=155.189.161.43 dst=211.84.1.69 protocol=tcp sport=50526 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "155.189.161.43",
"serverIP": "211.84.1.69"
} | Create a JSON artifact from the message |
<134>Original Address=174.68.214.235 1 1685733711.670324469 M41_MX67C_Macon l7_firewall src=155.189.161.43 dst=211.84.1.69 protocol=tcp sport=50526 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=174.68.214.235 1 1685733711.670324469 M41_MX67C_Macon l7_firewall src=155.189.161.43 dst=211.84.1.69 protocol=tcp sport=50526 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 50526
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 155.189.161.43
serverIP: 211.84.1.69 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1687312304.814894143 M34_MX67C_Atlanta l7_firewall src=43.89.201.86 dst=44.194.23.200 protocol=tcp sport=59547 dport=443 decision=blocked | {
"action": "block",
"clientport": 59547,
"message": "<134>Original Address=96.73.199.109 1 1687312304.814894143 M34_MX67C_Atlanta l7_firewall src=43.89.201.86 dst=44.194.23.200 protocol=tcp sport=59547 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "43.89.201.86",
"serverIP": "44.194.23.200"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1687312304.814894143 M34_MX67C_Atlanta l7_firewall src=43.89.201.86 dst=44.194.23.200 protocol=tcp sport=59547 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1687312304.814894143 M34_MX67C_Atlanta l7_firewall src=43.89.201.86 dst=44.194.23.200 protocol=tcp sport=59547 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 59547
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 43.89.201.86
serverIP: 44.194.23.200 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1687312304.814894143 M34_MX67C_Atlanta l7_firewall src=90.218.36.81 dst=138.209.78.196 protocol=tcp sport=59547 dport=443 decision=blocked | {
"action": "block",
"clientport": 59547,
"message": "<134>Original Address=96.73.199.109 1 1687312304.814894143 M34_MX67C_Atlanta l7_firewall src=90.218.36.81 dst=138.209.78.196 protocol=tcp sport=59547 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "90.218.36.81",
"serverIP": "138.209.78.196"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1687312304.814894143 M34_MX67C_Atlanta l7_firewall src=90.218.36.81 dst=138.209.78.196 protocol=tcp sport=59547 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1687312304.814894143 M34_MX67C_Atlanta l7_firewall src=90.218.36.81 dst=138.209.78.196 protocol=tcp sport=59547 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 59547
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 90.218.36.81
serverIP: 138.209.78.196 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1687312304.814894143 M34_MX67C_Atlanta l7_firewall src=122.204.245.37 dst=130.254.15.8 protocol=tcp sport=59547 dport=443 decision=blocked | {
"action": "block",
"clientport": 59547,
"message": "<134>Original Address=96.73.199.109 1 1687312304.814894143 M34_MX67C_Atlanta l7_firewall src=122.204.245.37 dst=130.254.15.8 protocol=tcp sport=59547 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "122.204.245.37",
"serverIP": "130.254.15.8"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1687312304.814894143 M34_MX67C_Atlanta l7_firewall src=122.204.245.37 dst=130.254.15.8 protocol=tcp sport=59547 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1687312304.814894143 M34_MX67C_Atlanta l7_firewall src=122.204.245.37 dst=130.254.15.8 protocol=tcp sport=59547 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 59547
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 122.204.245.37
serverIP: 130.254.15.8 | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1687312304.814894143 M34_MX67C_Atlanta l7_firewall src=166.39.167.102 dst=203.227.119.248 protocol=tcp sport=59547 dport=443 decision=blocked | {
"action": "block",
"clientport": 59547,
"message": "<134>Original Address=96.73.199.109 1 1687312304.814894143 M34_MX67C_Atlanta l7_firewall src=166.39.167.102 dst=203.227.119.248 protocol=tcp sport=59547 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "166.39.167.102",
"serverIP": "203.227.119.248"
} | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1687312304.814894143 M34_MX67C_Atlanta l7_firewall src=166.39.167.102 dst=203.227.119.248 protocol=tcp sport=59547 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1687312304.814894143 M34_MX67C_Atlanta l7_firewall src=166.39.167.102 dst=203.227.119.248 protocol=tcp sport=59547 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 59547
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 166.39.167.102
serverIP: 203.227.119.248 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1685839903.820593143 NORDC_MX400_1 l7_firewall src=42.218.147.84 dst=0.136.73.174 protocol=tcp sport=443 dport=43211 decision=blocked | {
"action": "block",
"clientport": 43211,
"message": "<134>Original Address=192.168.2.253 1 1685839903.820593143 NORDC_MX400_1 l7_firewall src=42.218.147.84 dst=0.136.73.174 protocol=tcp sport=443 dport=43211 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "0.136.73.174",
"serverIP": "42.218.147.84"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1685839903.820593143 NORDC_MX400_1 l7_firewall src=42.218.147.84 dst=0.136.73.174 protocol=tcp sport=443 dport=43211 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1685839903.820593143 NORDC_MX400_1 l7_firewall src=42.218.147.84 dst=0.136.73.174 protocol=tcp sport=443 dport=43211 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 43211
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 0.136.73.174
serverIP: 42.218.147.84 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1685839903.820593143 NORDC_MX400_1 l7_firewall src=198.187.92.228 dst=101.51.171.244 protocol=tcp sport=443 dport=43211 decision=blocked | {
"action": "block",
"clientport": 43211,
"message": "<134>Original Address=192.168.2.253 1 1685839903.820593143 NORDC_MX400_1 l7_firewall src=198.187.92.228 dst=101.51.171.244 protocol=tcp sport=443 dport=43211 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "101.51.171.244",
"serverIP": "198.187.92.228"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1685839903.820593143 NORDC_MX400_1 l7_firewall src=198.187.92.228 dst=101.51.171.244 protocol=tcp sport=443 dport=43211 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1685839903.820593143 NORDC_MX400_1 l7_firewall src=198.187.92.228 dst=101.51.171.244 protocol=tcp sport=443 dport=43211 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 43211
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 101.51.171.244
serverIP: 198.187.92.228 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1685839903.820593143 NORDC_MX400_1 l7_firewall src=246.129.2.3 dst=122.25.75.121 protocol=tcp sport=443 dport=43211 decision=blocked | {
"action": "block",
"clientport": 43211,
"message": "<134>Original Address=192.168.2.253 1 1685839903.820593143 NORDC_MX400_1 l7_firewall src=246.129.2.3 dst=122.25.75.121 protocol=tcp sport=443 dport=43211 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "122.25.75.121",
"serverIP": "246.129.2.3"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1685839903.820593143 NORDC_MX400_1 l7_firewall src=246.129.2.3 dst=122.25.75.121 protocol=tcp sport=443 dport=43211 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1685839903.820593143 NORDC_MX400_1 l7_firewall src=246.129.2.3 dst=122.25.75.121 protocol=tcp sport=443 dport=43211 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 43211
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 122.25.75.121
serverIP: 246.129.2.3 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1685839903.820593143 NORDC_MX400_1 l7_firewall src=235.225.26.148 dst=176.139.192.50 protocol=tcp sport=443 dport=43211 decision=blocked | {
"action": "block",
"clientport": 43211,
"message": "<134>Original Address=192.168.2.253 1 1685839903.820593143 NORDC_MX400_1 l7_firewall src=235.225.26.148 dst=176.139.192.50 protocol=tcp sport=443 dport=43211 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "176.139.192.50",
"serverIP": "235.225.26.148"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1685839903.820593143 NORDC_MX400_1 l7_firewall src=235.225.26.148 dst=176.139.192.50 protocol=tcp sport=443 dport=43211 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1685839903.820593143 NORDC_MX400_1 l7_firewall src=235.225.26.148 dst=176.139.192.50 protocol=tcp sport=443 dport=43211 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 43211
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 176.139.192.50
serverIP: 235.225.26.148 | Explain this syslog message |
<134>Original Address=173.160.85.1 1 1656056895.219566852 M93_MX67C_MECCumming l7_firewall src=75.200.202.122 dst=20.117.122.192 protocol=tcp sport=58606 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=173.160.85.1 1 1656056895.219566852 M93_MX67C_MECCumming l7_firewall src=75.200.202.122 dst=20.117.122.192 protocol=tcp sport=58606 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 58606,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "75.200.202.122",
"serverIP": "20.117.122.192"
} | Create a JSON artifact from the message |
<134>Original Address=173.160.85.1 1 1656056895.219566852 M93_MX67C_MECCumming l7_firewall src=75.200.202.122 dst=20.117.122.192 protocol=tcp sport=58606 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=173.160.85.1 1 1656056895.219566852 M93_MX67C_MECCumming l7_firewall src=75.200.202.122 dst=20.117.122.192 protocol=tcp sport=58606 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 58606
protocol: 6
streamName: meraki_l7_firewall
clientIP: 75.200.202.122
serverIP: 20.117.122.192 | Explain this syslog message |
<134>Original Address=173.160.85.1 1 1656056895.219566852 M93_MX67C_MECCumming l7_firewall src=3.209.82.77 dst=129.90.167.82 protocol=tcp sport=58606 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=173.160.85.1 1 1656056895.219566852 M93_MX67C_MECCumming l7_firewall src=3.209.82.77 dst=129.90.167.82 protocol=tcp sport=58606 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 58606,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "3.209.82.77",
"serverIP": "129.90.167.82"
} | Create a JSON artifact from the message |
<134>Original Address=173.160.85.1 1 1656056895.219566852 M93_MX67C_MECCumming l7_firewall src=3.209.82.77 dst=129.90.167.82 protocol=tcp sport=58606 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=173.160.85.1 1 1656056895.219566852 M93_MX67C_MECCumming l7_firewall src=3.209.82.77 dst=129.90.167.82 protocol=tcp sport=58606 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 58606
protocol: 6
streamName: meraki_l7_firewall
clientIP: 3.209.82.77
serverIP: 129.90.167.82 | Explain this syslog message |
<134>Original Address=173.160.85.1 1 1656056895.219566852 M93_MX67C_MECCumming l7_firewall src=231.134.239.160 dst=102.59.153.77 protocol=tcp sport=58606 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=173.160.85.1 1 1656056895.219566852 M93_MX67C_MECCumming l7_firewall src=231.134.239.160 dst=102.59.153.77 protocol=tcp sport=58606 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 58606,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "231.134.239.160",
"serverIP": "102.59.153.77"
} | Create a JSON artifact from the message |
<134>Original Address=173.160.85.1 1 1656056895.219566852 M93_MX67C_MECCumming l7_firewall src=231.134.239.160 dst=102.59.153.77 protocol=tcp sport=58606 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=173.160.85.1 1 1656056895.219566852 M93_MX67C_MECCumming l7_firewall src=231.134.239.160 dst=102.59.153.77 protocol=tcp sport=58606 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 58606
protocol: 6
streamName: meraki_l7_firewall
clientIP: 231.134.239.160
serverIP: 102.59.153.77 | Explain this syslog message |
<134>Original Address=173.160.85.1 1 1656056895.219566852 M93_MX67C_MECCumming l7_firewall src=112.24.224.64 dst=83.121.101.72 protocol=tcp sport=58606 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=173.160.85.1 1 1656056895.219566852 M93_MX67C_MECCumming l7_firewall src=112.24.224.64 dst=83.121.101.72 protocol=tcp sport=58606 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 58606,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "112.24.224.64",
"serverIP": "83.121.101.72"
} | Create a JSON artifact from the message |
<134>Original Address=173.160.85.1 1 1656056895.219566852 M93_MX67C_MECCumming l7_firewall src=112.24.224.64 dst=83.121.101.72 protocol=tcp sport=58606 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=173.160.85.1 1 1656056895.219566852 M93_MX67C_MECCumming l7_firewall src=112.24.224.64 dst=83.121.101.72 protocol=tcp sport=58606 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 58606
protocol: 6
streamName: meraki_l7_firewall
clientIP: 112.24.224.64
serverIP: 83.121.101.72 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1689954855.153436442 NORDC_MX400_1 l7_firewall src=224.142.119.105 dst=33.114.174.215 protocol=udp sport=63119 dport=4169 decision=blocked | {
"action": "block",
"clientport": 63119,
"message": "<134>Original Address=192.168.2.253 1 1689954855.153436442 NORDC_MX400_1 l7_firewall src=224.142.119.105 dst=33.114.174.215 protocol=udp sport=63119 dport=4169 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 4169,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "224.142.119.105",
"serverIP": "33.114.174.215"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1689954855.153436442 NORDC_MX400_1 l7_firewall src=224.142.119.105 dst=33.114.174.215 protocol=udp sport=63119 dport=4169 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1689954855.153436442 NORDC_MX400_1 l7_firewall src=224.142.119.105 dst=33.114.174.215 protocol=udp sport=63119 dport=4169 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 63119
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 4169
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 224.142.119.105
serverIP: 33.114.174.215 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1689954855.153436442 NORDC_MX400_1 l7_firewall src=203.195.110.231 dst=191.4.251.165 protocol=udp sport=63119 dport=4169 decision=blocked | {
"action": "block",
"clientport": 63119,
"message": "<134>Original Address=192.168.2.253 1 1689954855.153436442 NORDC_MX400_1 l7_firewall src=203.195.110.231 dst=191.4.251.165 protocol=udp sport=63119 dport=4169 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 4169,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "203.195.110.231",
"serverIP": "191.4.251.165"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1689954855.153436442 NORDC_MX400_1 l7_firewall src=203.195.110.231 dst=191.4.251.165 protocol=udp sport=63119 dport=4169 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1689954855.153436442 NORDC_MX400_1 l7_firewall src=203.195.110.231 dst=191.4.251.165 protocol=udp sport=63119 dport=4169 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 63119
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 4169
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 203.195.110.231
serverIP: 191.4.251.165 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1689954855.153436442 NORDC_MX400_1 l7_firewall src=39.205.27.150 dst=20.180.39.109 protocol=udp sport=63119 dport=4169 decision=blocked | {
"action": "block",
"clientport": 63119,
"message": "<134>Original Address=192.168.2.253 1 1689954855.153436442 NORDC_MX400_1 l7_firewall src=39.205.27.150 dst=20.180.39.109 protocol=udp sport=63119 dport=4169 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 4169,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "39.205.27.150",
"serverIP": "20.180.39.109"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1689954855.153436442 NORDC_MX400_1 l7_firewall src=39.205.27.150 dst=20.180.39.109 protocol=udp sport=63119 dport=4169 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1689954855.153436442 NORDC_MX400_1 l7_firewall src=39.205.27.150 dst=20.180.39.109 protocol=udp sport=63119 dport=4169 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 63119
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 4169
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 39.205.27.150
serverIP: 20.180.39.109 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1689954855.153436442 NORDC_MX400_1 l7_firewall src=237.210.220.2 dst=58.49.2.110 protocol=udp sport=63119 dport=4169 decision=blocked | {
"action": "block",
"clientport": 63119,
"message": "<134>Original Address=192.168.2.253 1 1689954855.153436442 NORDC_MX400_1 l7_firewall src=237.210.220.2 dst=58.49.2.110 protocol=udp sport=63119 dport=4169 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 4169,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "237.210.220.2",
"serverIP": "58.49.2.110"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1689954855.153436442 NORDC_MX400_1 l7_firewall src=237.210.220.2 dst=58.49.2.110 protocol=udp sport=63119 dport=4169 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1689954855.153436442 NORDC_MX400_1 l7_firewall src=237.210.220.2 dst=58.49.2.110 protocol=udp sport=63119 dport=4169 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 63119
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 4169
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 237.210.220.2
serverIP: 58.49.2.110 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1690823879.509567082 NORDC_MX400_1 l7_firewall src=138.69.165.99 dst=148.227.163.233 protocol=tcp sport=60509 dport=443 decision=blocked | {
"action": "block",
"clientport": 60509,
"message": "<134>Original Address=192.168.2.253 1 1690823879.509567082 NORDC_MX400_1 l7_firewall src=138.69.165.99 dst=148.227.163.233 protocol=tcp sport=60509 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "138.69.165.99",
"serverIP": "148.227.163.233"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1690823879.509567082 NORDC_MX400_1 l7_firewall src=138.69.165.99 dst=148.227.163.233 protocol=tcp sport=60509 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.