input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<185>Feb 6 17:23:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=5.120.114.110 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=137.139.100.114 spt=37156 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 17:23:38 rt=1675725818049 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=186290ac8c1-6c0226d5 cn2=37156 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=137.139.100.114 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
{ "senderhost": "10.0.0.250", "serverport": 443, "severitylabel": "alert", "tags": [ "RuleID:global", "barracuda_waf_GEO_IP_BLOCK", "AttackGroup:Forceful Browsing", "ProxyIP:185.224.128.219", "RuleType:GLOBAL", "barracuda_waf", "rfc3164", "GEO_IP_BLOCK", "cef", "SessionID:-", "FollowUpAction:NONE" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<185>Feb 6 17:23:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=5.120.114.110 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=137.139.100.114 spt=37156 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 06 2023 17:23:38 rt=1675725818049 request=/_asterisk/ requestClientApplication=\"python-requests/2.22.0\" dvchost=WAFirewall externalId=186290ac8c1-6c0226d5 cn2=37156 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=137.139.100.114 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n", "localstarttime": "1675725818049 ", "sensitivity": "normal", "localhostname": "WAFirewall", "priority": 185, "facilitylabel": "local7", "messagetype": "GEO_IP_BLOCK", "severitycode": 9, "fqdn": "/_asterisk/", "clientport": 37156, "vendorcode": "342", "action": "block", "facilitycode": 23, "streamName": "barracuda_waf", "clientIP": "137.139.100.114", "serverIP": "5.120.114.110", "userName": "-" }
Create a JSON artifact from the message
<185>Feb 6 17:23:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=5.120.114.110 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=137.139.100.114 spt=37156 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 17:23:38 rt=1675725818049 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=186290ac8c1-6c0226d5 cn2=37156 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=137.139.100.114 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
Product: Barracuda WAF Vendor: Barracuda
Identify this syslog message
<185>Feb 6 17:23:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=5.120.114.110 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=137.139.100.114 spt=37156 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 17:23:38 rt=1675725818049 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=186290ac8c1-6c0226d5 cn2=37156 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=137.139.100.114 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message: senderhost: 10.0.0.250 serverport: 443 severitylabel: alert tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'ProxyIP:185.224.128.219', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE'] productids: [0] sourceinfo: unknown localstarttime: 1675725818049 sensitivity: normal localhostname: WAFirewall priority: 185 facilitylabel: local7 messagetype: GEO_IP_BLOCK severitycode: 9 fqdn: /_asterisk/ clientport: 37156 vendorcode: 342 action: block facilitycode: 23 streamName: barracuda_waf clientIP: 137.139.100.114 serverIP: 5.120.114.110 userName: -
Explain this syslog message
<134>Original Address=74.95.48.161 1 1660606064.342201583 M83_MX67C_MuscleShoals l7_firewall src=136.137.251.143 dst=26.183.186.173 protocol=tcp sport=50655 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=74.95.48.161 1 1660606064.342201583 M83_MX67C_MuscleShoals l7_firewall src=136.137.251.143 dst=26.183.186.173 protocol=tcp sport=50655 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 50655, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "136.137.251.143", "serverIP": "26.183.186.173" }
Create a JSON artifact from the message
<134>Original Address=74.95.48.161 1 1660606064.342201583 M83_MX67C_MuscleShoals l7_firewall src=136.137.251.143 dst=26.183.186.173 protocol=tcp sport=50655 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=74.95.48.161 1 1660606064.342201583 M83_MX67C_MuscleShoals l7_firewall src=136.137.251.143 dst=26.183.186.173 protocol=tcp sport=50655 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 50655 protocol: 6 streamName: meraki_l7_firewall clientIP: 136.137.251.143 serverIP: 26.183.186.173
Explain this syslog message
<134>Original Address=74.95.48.161 1 1660606064.342201583 M83_MX67C_MuscleShoals l7_firewall src=58.51.232.148 dst=164.52.192.160 protocol=tcp sport=50655 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=74.95.48.161 1 1660606064.342201583 M83_MX67C_MuscleShoals l7_firewall src=58.51.232.148 dst=164.52.192.160 protocol=tcp sport=50655 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 50655, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "58.51.232.148", "serverIP": "164.52.192.160" }
Create a JSON artifact from the message
<134>Original Address=74.95.48.161 1 1660606064.342201583 M83_MX67C_MuscleShoals l7_firewall src=58.51.232.148 dst=164.52.192.160 protocol=tcp sport=50655 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=74.95.48.161 1 1660606064.342201583 M83_MX67C_MuscleShoals l7_firewall src=58.51.232.148 dst=164.52.192.160 protocol=tcp sport=50655 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 50655 protocol: 6 streamName: meraki_l7_firewall clientIP: 58.51.232.148 serverIP: 164.52.192.160
Explain this syslog message
<134>Original Address=74.95.48.161 1 1660606064.342201583 M83_MX67C_MuscleShoals l7_firewall src=26.166.241.197 dst=143.129.160.127 protocol=tcp sport=50655 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=74.95.48.161 1 1660606064.342201583 M83_MX67C_MuscleShoals l7_firewall src=26.166.241.197 dst=143.129.160.127 protocol=tcp sport=50655 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 50655, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "26.166.241.197", "serverIP": "143.129.160.127" }
Create a JSON artifact from the message
<134>Original Address=74.95.48.161 1 1660606064.342201583 M83_MX67C_MuscleShoals l7_firewall src=26.166.241.197 dst=143.129.160.127 protocol=tcp sport=50655 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=74.95.48.161 1 1660606064.342201583 M83_MX67C_MuscleShoals l7_firewall src=26.166.241.197 dst=143.129.160.127 protocol=tcp sport=50655 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 50655 protocol: 6 streamName: meraki_l7_firewall clientIP: 26.166.241.197 serverIP: 143.129.160.127
Explain this syslog message
<134>Original Address=74.95.48.161 1 1660606064.342201583 M83_MX67C_MuscleShoals l7_firewall src=40.118.243.41 dst=7.14.39.51 protocol=tcp sport=50655 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=74.95.48.161 1 1660606064.342201583 M83_MX67C_MuscleShoals l7_firewall src=40.118.243.41 dst=7.14.39.51 protocol=tcp sport=50655 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 50655, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "40.118.243.41", "serverIP": "7.14.39.51" }
Create a JSON artifact from the message
<134>Original Address=74.95.48.161 1 1660606064.342201583 M83_MX67C_MuscleShoals l7_firewall src=40.118.243.41 dst=7.14.39.51 protocol=tcp sport=50655 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=74.95.48.161 1 1660606064.342201583 M83_MX67C_MuscleShoals l7_firewall src=40.118.243.41 dst=7.14.39.51 protocol=tcp sport=50655 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 50655 protocol: 6 streamName: meraki_l7_firewall clientIP: 40.118.243.41 serverIP: 7.14.39.51
Explain this syslog message
<134>Original Address=75.146.93.165 1 1660138115.462411563 M61_MX67C_Savannah l7_firewall src=174.49.61.74 dst=142.142.111.211 protocol=tcp sport=35674 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1660138115.462411563 M61_MX67C_Savannah l7_firewall src=174.49.61.74 dst=142.142.111.211 protocol=tcp sport=35674 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 35674, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "174.49.61.74", "serverIP": "142.142.111.211" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1660138115.462411563 M61_MX67C_Savannah l7_firewall src=174.49.61.74 dst=142.142.111.211 protocol=tcp sport=35674 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1660138115.462411563 M61_MX67C_Savannah l7_firewall src=174.49.61.74 dst=142.142.111.211 protocol=tcp sport=35674 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 35674 protocol: 6 streamName: meraki_l7_firewall clientIP: 174.49.61.74 serverIP: 142.142.111.211
Explain this syslog message
<134>Original Address=75.146.93.165 1 1660138115.462411563 M61_MX67C_Savannah l7_firewall src=204.146.159.153 dst=3.51.71.136 protocol=tcp sport=35674 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1660138115.462411563 M61_MX67C_Savannah l7_firewall src=204.146.159.153 dst=3.51.71.136 protocol=tcp sport=35674 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 35674, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "204.146.159.153", "serverIP": "3.51.71.136" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1660138115.462411563 M61_MX67C_Savannah l7_firewall src=204.146.159.153 dst=3.51.71.136 protocol=tcp sport=35674 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1660138115.462411563 M61_MX67C_Savannah l7_firewall src=204.146.159.153 dst=3.51.71.136 protocol=tcp sport=35674 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 35674 protocol: 6 streamName: meraki_l7_firewall clientIP: 204.146.159.153 serverIP: 3.51.71.136
Explain this syslog message
<134>Original Address=75.146.93.165 1 1660138115.462411563 M61_MX67C_Savannah l7_firewall src=64.54.251.7 dst=50.124.195.115 protocol=tcp sport=35674 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1660138115.462411563 M61_MX67C_Savannah l7_firewall src=64.54.251.7 dst=50.124.195.115 protocol=tcp sport=35674 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 35674, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "64.54.251.7", "serverIP": "50.124.195.115" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1660138115.462411563 M61_MX67C_Savannah l7_firewall src=64.54.251.7 dst=50.124.195.115 protocol=tcp sport=35674 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1660138115.462411563 M61_MX67C_Savannah l7_firewall src=64.54.251.7 dst=50.124.195.115 protocol=tcp sport=35674 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 35674 protocol: 6 streamName: meraki_l7_firewall clientIP: 64.54.251.7 serverIP: 50.124.195.115
Explain this syslog message
<134>Original Address=75.146.93.165 1 1660138115.462411563 M61_MX67C_Savannah l7_firewall src=155.185.216.151 dst=166.102.226.51 protocol=tcp sport=35674 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1660138115.462411563 M61_MX67C_Savannah l7_firewall src=155.185.216.151 dst=166.102.226.51 protocol=tcp sport=35674 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 35674, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "155.185.216.151", "serverIP": "166.102.226.51" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1660138115.462411563 M61_MX67C_Savannah l7_firewall src=155.185.216.151 dst=166.102.226.51 protocol=tcp sport=35674 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1660138115.462411563 M61_MX67C_Savannah l7_firewall src=155.185.216.151 dst=166.102.226.51 protocol=tcp sport=35674 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 35674 protocol: 6 streamName: meraki_l7_firewall clientIP: 155.185.216.151 serverIP: 166.102.226.51
Explain this syslog message
<134>Original Address=75.146.93.165 1 1660137823.635201563 M61_MX67C_Savannah l7_firewall src=211.40.235.100 dst=135.114.229.141 protocol=tcp sport=42532 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1660137823.635201563 M61_MX67C_Savannah l7_firewall src=211.40.235.100 dst=135.114.229.141 protocol=tcp sport=42532 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 42532, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "211.40.235.100", "serverIP": "135.114.229.141" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1660137823.635201563 M61_MX67C_Savannah l7_firewall src=211.40.235.100 dst=135.114.229.141 protocol=tcp sport=42532 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1660137823.635201563 M61_MX67C_Savannah l7_firewall src=211.40.235.100 dst=135.114.229.141 protocol=tcp sport=42532 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 42532 protocol: 6 streamName: meraki_l7_firewall clientIP: 211.40.235.100 serverIP: 135.114.229.141
Explain this syslog message
<134>Original Address=75.146.93.165 1 1660137823.635201563 M61_MX67C_Savannah l7_firewall src=128.88.71.159 dst=192.176.154.88 protocol=tcp sport=42532 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1660137823.635201563 M61_MX67C_Savannah l7_firewall src=128.88.71.159 dst=192.176.154.88 protocol=tcp sport=42532 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 42532, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "128.88.71.159", "serverIP": "192.176.154.88" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1660137823.635201563 M61_MX67C_Savannah l7_firewall src=128.88.71.159 dst=192.176.154.88 protocol=tcp sport=42532 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1660137823.635201563 M61_MX67C_Savannah l7_firewall src=128.88.71.159 dst=192.176.154.88 protocol=tcp sport=42532 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 42532 protocol: 6 streamName: meraki_l7_firewall clientIP: 128.88.71.159 serverIP: 192.176.154.88
Explain this syslog message
<134>Original Address=75.146.93.165 1 1660137823.635201563 M61_MX67C_Savannah l7_firewall src=7.36.111.160 dst=115.35.49.96 protocol=tcp sport=42532 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1660137823.635201563 M61_MX67C_Savannah l7_firewall src=7.36.111.160 dst=115.35.49.96 protocol=tcp sport=42532 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 42532, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "7.36.111.160", "serverIP": "115.35.49.96" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1660137823.635201563 M61_MX67C_Savannah l7_firewall src=7.36.111.160 dst=115.35.49.96 protocol=tcp sport=42532 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1660137823.635201563 M61_MX67C_Savannah l7_firewall src=7.36.111.160 dst=115.35.49.96 protocol=tcp sport=42532 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 42532 protocol: 6 streamName: meraki_l7_firewall clientIP: 7.36.111.160 serverIP: 115.35.49.96
Explain this syslog message
<134>Original Address=75.146.93.165 1 1660137823.635201563 M61_MX67C_Savannah l7_firewall src=168.80.29.51 dst=124.120.144.251 protocol=tcp sport=42532 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1660137823.635201563 M61_MX67C_Savannah l7_firewall src=168.80.29.51 dst=124.120.144.251 protocol=tcp sport=42532 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 42532, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "168.80.29.51", "serverIP": "124.120.144.251" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1660137823.635201563 M61_MX67C_Savannah l7_firewall src=168.80.29.51 dst=124.120.144.251 protocol=tcp sport=42532 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1660137823.635201563 M61_MX67C_Savannah l7_firewall src=168.80.29.51 dst=124.120.144.251 protocol=tcp sport=42532 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 42532 protocol: 6 streamName: meraki_l7_firewall clientIP: 168.80.29.51 serverIP: 124.120.144.251
Explain this syslog message
<134>Original Address=75.146.93.165 1 1660140553.908188177 M61_MX67C_Savannah l7_firewall src=163.105.254.166 dst=117.253.32.114 protocol=tcp sport=52960 dport=5223 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 5223, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1660140553.908188177 M61_MX67C_Savannah l7_firewall src=163.105.254.166 dst=117.253.32.114 protocol=tcp sport=52960 dport=5223 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 52960, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "163.105.254.166", "serverIP": "117.253.32.114" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1660140553.908188177 M61_MX67C_Savannah l7_firewall src=163.105.254.166 dst=117.253.32.114 protocol=tcp sport=52960 dport=5223 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1660140553.908188177 M61_MX67C_Savannah l7_firewall src=163.105.254.166 dst=117.253.32.114 protocol=tcp sport=52960 dport=5223 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 5223 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 52960 protocol: 6 streamName: meraki_l7_firewall clientIP: 163.105.254.166 serverIP: 117.253.32.114
Explain this syslog message
<134>Original Address=75.146.93.165 1 1660140553.908188177 M61_MX67C_Savannah l7_firewall src=97.241.250.94 dst=148.147.100.238 protocol=tcp sport=52960 dport=5223 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 5223, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1660140553.908188177 M61_MX67C_Savannah l7_firewall src=97.241.250.94 dst=148.147.100.238 protocol=tcp sport=52960 dport=5223 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 52960, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "97.241.250.94", "serverIP": "148.147.100.238" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1660140553.908188177 M61_MX67C_Savannah l7_firewall src=97.241.250.94 dst=148.147.100.238 protocol=tcp sport=52960 dport=5223 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1660140553.908188177 M61_MX67C_Savannah l7_firewall src=97.241.250.94 dst=148.147.100.238 protocol=tcp sport=52960 dport=5223 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 5223 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 52960 protocol: 6 streamName: meraki_l7_firewall clientIP: 97.241.250.94 serverIP: 148.147.100.238
Explain this syslog message
<134>Original Address=75.146.93.165 1 1660140553.908188177 M61_MX67C_Savannah l7_firewall src=127.114.38.185 dst=17.103.149.255 protocol=tcp sport=52960 dport=5223 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 5223, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1660140553.908188177 M61_MX67C_Savannah l7_firewall src=127.114.38.185 dst=17.103.149.255 protocol=tcp sport=52960 dport=5223 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 52960, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "127.114.38.185", "serverIP": "17.103.149.255" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1660140553.908188177 M61_MX67C_Savannah l7_firewall src=127.114.38.185 dst=17.103.149.255 protocol=tcp sport=52960 dport=5223 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1660140553.908188177 M61_MX67C_Savannah l7_firewall src=127.114.38.185 dst=17.103.149.255 protocol=tcp sport=52960 dport=5223 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 5223 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 52960 protocol: 6 streamName: meraki_l7_firewall clientIP: 127.114.38.185 serverIP: 17.103.149.255
Explain this syslog message
<134>Original Address=75.146.93.165 1 1660140553.908188177 M61_MX67C_Savannah l7_firewall src=37.33.85.96 dst=235.130.78.108 protocol=tcp sport=52960 dport=5223 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 5223, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1660140553.908188177 M61_MX67C_Savannah l7_firewall src=37.33.85.96 dst=235.130.78.108 protocol=tcp sport=52960 dport=5223 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 52960, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "37.33.85.96", "serverIP": "235.130.78.108" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1660140553.908188177 M61_MX67C_Savannah l7_firewall src=37.33.85.96 dst=235.130.78.108 protocol=tcp sport=52960 dport=5223 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1660140553.908188177 M61_MX67C_Savannah l7_firewall src=37.33.85.96 dst=235.130.78.108 protocol=tcp sport=52960 dport=5223 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 5223 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 52960 protocol: 6 streamName: meraki_l7_firewall clientIP: 37.33.85.96 serverIP: 235.130.78.108
Explain this syslog message
<134>Original Address=75.146.93.165 1 1660138115.287604843 M61_MX67C_Savannah l7_firewall src=244.184.254.32 dst=11.73.115.4 protocol=tcp sport=49865 dport=80 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 80, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1660138115.287604843 M61_MX67C_Savannah l7_firewall src=244.184.254.32 dst=11.73.115.4 protocol=tcp sport=49865 dport=80 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 49865, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "244.184.254.32", "serverIP": "11.73.115.4" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1660138115.287604843 M61_MX67C_Savannah l7_firewall src=244.184.254.32 dst=11.73.115.4 protocol=tcp sport=49865 dport=80 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1660138115.287604843 M61_MX67C_Savannah l7_firewall src=244.184.254.32 dst=11.73.115.4 protocol=tcp sport=49865 dport=80 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 80 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 49865 protocol: 6 streamName: meraki_l7_firewall clientIP: 244.184.254.32 serverIP: 11.73.115.4
Explain this syslog message
<134>Original Address=75.146.93.165 1 1660138115.287604843 M61_MX67C_Savannah l7_firewall src=60.152.164.148 dst=41.165.235.193 protocol=tcp sport=49865 dport=80 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 80, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1660138115.287604843 M61_MX67C_Savannah l7_firewall src=60.152.164.148 dst=41.165.235.193 protocol=tcp sport=49865 dport=80 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 49865, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "60.152.164.148", "serverIP": "41.165.235.193" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1660138115.287604843 M61_MX67C_Savannah l7_firewall src=60.152.164.148 dst=41.165.235.193 protocol=tcp sport=49865 dport=80 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1660138115.287604843 M61_MX67C_Savannah l7_firewall src=60.152.164.148 dst=41.165.235.193 protocol=tcp sport=49865 dport=80 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 80 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 49865 protocol: 6 streamName: meraki_l7_firewall clientIP: 60.152.164.148 serverIP: 41.165.235.193
Explain this syslog message
<134>Original Address=75.146.93.165 1 1660138115.287604843 M61_MX67C_Savannah l7_firewall src=245.161.4.145 dst=208.228.31.248 protocol=tcp sport=49865 dport=80 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 80, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1660138115.287604843 M61_MX67C_Savannah l7_firewall src=245.161.4.145 dst=208.228.31.248 protocol=tcp sport=49865 dport=80 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 49865, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "245.161.4.145", "serverIP": "208.228.31.248" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1660138115.287604843 M61_MX67C_Savannah l7_firewall src=245.161.4.145 dst=208.228.31.248 protocol=tcp sport=49865 dport=80 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1660138115.287604843 M61_MX67C_Savannah l7_firewall src=245.161.4.145 dst=208.228.31.248 protocol=tcp sport=49865 dport=80 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 80 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 49865 protocol: 6 streamName: meraki_l7_firewall clientIP: 245.161.4.145 serverIP: 208.228.31.248
Explain this syslog message
<134>Original Address=75.146.93.165 1 1660138115.287604843 M61_MX67C_Savannah l7_firewall src=160.160.52.229 dst=91.254.89.58 protocol=tcp sport=49865 dport=80 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 80, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=75.146.93.165 1 1660138115.287604843 M61_MX67C_Savannah l7_firewall src=160.160.52.229 dst=91.254.89.58 protocol=tcp sport=49865 dport=80 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 49865, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "160.160.52.229", "serverIP": "91.254.89.58" }
Create a JSON artifact from the message
<134>Original Address=75.146.93.165 1 1660138115.287604843 M61_MX67C_Savannah l7_firewall src=160.160.52.229 dst=91.254.89.58 protocol=tcp sport=49865 dport=80 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=75.146.93.165 1 1660138115.287604843 M61_MX67C_Savannah l7_firewall src=160.160.52.229 dst=91.254.89.58 protocol=tcp sport=49865 dport=80 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 80 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 49865 protocol: 6 streamName: meraki_l7_firewall clientIP: 160.160.52.229 serverIP: 91.254.89.58
Explain this syslog message
<134>Original Address=50.243.215.201 1 1660141465.123730314 M92_MX67C_MECBraselton l7_firewall src=119.87.53.217 dst=206.145.180.72 protocol=tcp sport=51010 dport=80 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 80, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=50.243.215.201 1 1660141465.123730314 M92_MX67C_MECBraselton l7_firewall src=119.87.53.217 dst=206.145.180.72 protocol=tcp sport=51010 dport=80 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 51010, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "119.87.53.217", "serverIP": "206.145.180.72" }
Create a JSON artifact from the message
<134>Original Address=50.243.215.201 1 1660141465.123730314 M92_MX67C_MECBraselton l7_firewall src=119.87.53.217 dst=206.145.180.72 protocol=tcp sport=51010 dport=80 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=50.243.215.201 1 1660141465.123730314 M92_MX67C_MECBraselton l7_firewall src=119.87.53.217 dst=206.145.180.72 protocol=tcp sport=51010 dport=80 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 80 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 51010 protocol: 6 streamName: meraki_l7_firewall clientIP: 119.87.53.217 serverIP: 206.145.180.72
Explain this syslog message
<134>Original Address=50.243.215.201 1 1660141465.123730314 M92_MX67C_MECBraselton l7_firewall src=195.185.169.131 dst=8.217.46.93 protocol=tcp sport=51010 dport=80 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 80, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=50.243.215.201 1 1660141465.123730314 M92_MX67C_MECBraselton l7_firewall src=195.185.169.131 dst=8.217.46.93 protocol=tcp sport=51010 dport=80 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 51010, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "195.185.169.131", "serverIP": "8.217.46.93" }
Create a JSON artifact from the message
<134>Original Address=50.243.215.201 1 1660141465.123730314 M92_MX67C_MECBraselton l7_firewall src=195.185.169.131 dst=8.217.46.93 protocol=tcp sport=51010 dport=80 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=50.243.215.201 1 1660141465.123730314 M92_MX67C_MECBraselton l7_firewall src=195.185.169.131 dst=8.217.46.93 protocol=tcp sport=51010 dport=80 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 80 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 51010 protocol: 6 streamName: meraki_l7_firewall clientIP: 195.185.169.131 serverIP: 8.217.46.93
Explain this syslog message
<134>Original Address=50.243.215.201 1 1660141465.123730314 M92_MX67C_MECBraselton l7_firewall src=248.116.2.189 dst=218.181.217.174 protocol=tcp sport=51010 dport=80 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 80, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=50.243.215.201 1 1660141465.123730314 M92_MX67C_MECBraselton l7_firewall src=248.116.2.189 dst=218.181.217.174 protocol=tcp sport=51010 dport=80 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 51010, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "248.116.2.189", "serverIP": "218.181.217.174" }
Create a JSON artifact from the message
<134>Original Address=50.243.215.201 1 1660141465.123730314 M92_MX67C_MECBraselton l7_firewall src=248.116.2.189 dst=218.181.217.174 protocol=tcp sport=51010 dport=80 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=50.243.215.201 1 1660141465.123730314 M92_MX67C_MECBraselton l7_firewall src=248.116.2.189 dst=218.181.217.174 protocol=tcp sport=51010 dport=80 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 80 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 51010 protocol: 6 streamName: meraki_l7_firewall clientIP: 248.116.2.189 serverIP: 218.181.217.174
Explain this syslog message
<134>Original Address=50.243.215.201 1 1660141465.123730314 M92_MX67C_MECBraselton l7_firewall src=133.191.229.209 dst=87.105.31.255 protocol=tcp sport=51010 dport=80 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 80, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=50.243.215.201 1 1660141465.123730314 M92_MX67C_MECBraselton l7_firewall src=133.191.229.209 dst=87.105.31.255 protocol=tcp sport=51010 dport=80 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 51010, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "133.191.229.209", "serverIP": "87.105.31.255" }
Create a JSON artifact from the message
<134>Original Address=50.243.215.201 1 1660141465.123730314 M92_MX67C_MECBraselton l7_firewall src=133.191.229.209 dst=87.105.31.255 protocol=tcp sport=51010 dport=80 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=50.243.215.201 1 1660141465.123730314 M92_MX67C_MECBraselton l7_firewall src=133.191.229.209 dst=87.105.31.255 protocol=tcp sport=51010 dport=80 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 80 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 51010 protocol: 6 streamName: meraki_l7_firewall clientIP: 133.191.229.209 serverIP: 87.105.31.255
Explain this syslog message
<134>Original Address=69.57.50.101 1 1660851333.462193461 M53_MX67C_GulfShores l7_firewall src=46.127.164.182 dst=33.160.175.177 protocol=udp sport=36289 dport=53 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 53, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=69.57.50.101 1 1660851333.462193461 M53_MX67C_GulfShores l7_firewall src=46.127.164.182 dst=33.160.175.177 protocol=udp sport=36289 dport=53 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 36289, "protocol": 17, "streamName": "meraki_l7_firewall", "clientIP": "46.127.164.182", "serverIP": "33.160.175.177" }
Create a JSON artifact from the message
<134>Original Address=69.57.50.101 1 1660851333.462193461 M53_MX67C_GulfShores l7_firewall src=46.127.164.182 dst=33.160.175.177 protocol=udp sport=36289 dport=53 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=69.57.50.101 1 1660851333.462193461 M53_MX67C_GulfShores l7_firewall src=46.127.164.182 dst=33.160.175.177 protocol=udp sport=36289 dport=53 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 53 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 36289 protocol: 17 streamName: meraki_l7_firewall clientIP: 46.127.164.182 serverIP: 33.160.175.177
Explain this syslog message
<134>Original Address=69.57.50.101 1 1660851333.462193461 M53_MX67C_GulfShores l7_firewall src=108.165.240.185 dst=83.0.187.167 protocol=udp sport=36289 dport=53 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 53, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=69.57.50.101 1 1660851333.462193461 M53_MX67C_GulfShores l7_firewall src=108.165.240.185 dst=83.0.187.167 protocol=udp sport=36289 dport=53 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 36289, "protocol": 17, "streamName": "meraki_l7_firewall", "clientIP": "108.165.240.185", "serverIP": "83.0.187.167" }
Create a JSON artifact from the message
<134>Original Address=69.57.50.101 1 1660851333.462193461 M53_MX67C_GulfShores l7_firewall src=108.165.240.185 dst=83.0.187.167 protocol=udp sport=36289 dport=53 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=69.57.50.101 1 1660851333.462193461 M53_MX67C_GulfShores l7_firewall src=108.165.240.185 dst=83.0.187.167 protocol=udp sport=36289 dport=53 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 53 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 36289 protocol: 17 streamName: meraki_l7_firewall clientIP: 108.165.240.185 serverIP: 83.0.187.167
Explain this syslog message
<134>Original Address=69.57.50.101 1 1660851333.462193461 M53_MX67C_GulfShores l7_firewall src=126.232.51.216 dst=68.42.143.140 protocol=udp sport=36289 dport=53 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 53, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=69.57.50.101 1 1660851333.462193461 M53_MX67C_GulfShores l7_firewall src=126.232.51.216 dst=68.42.143.140 protocol=udp sport=36289 dport=53 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 36289, "protocol": 17, "streamName": "meraki_l7_firewall", "clientIP": "126.232.51.216", "serverIP": "68.42.143.140" }
Create a JSON artifact from the message
<134>Original Address=69.57.50.101 1 1660851333.462193461 M53_MX67C_GulfShores l7_firewall src=126.232.51.216 dst=68.42.143.140 protocol=udp sport=36289 dport=53 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=69.57.50.101 1 1660851333.462193461 M53_MX67C_GulfShores l7_firewall src=126.232.51.216 dst=68.42.143.140 protocol=udp sport=36289 dport=53 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 53 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 36289 protocol: 17 streamName: meraki_l7_firewall clientIP: 126.232.51.216 serverIP: 68.42.143.140
Explain this syslog message
<134>Original Address=69.57.50.101 1 1660851333.462193461 M53_MX67C_GulfShores l7_firewall src=135.199.164.59 dst=152.192.166.3 protocol=udp sport=36289 dport=53 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 53, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=69.57.50.101 1 1660851333.462193461 M53_MX67C_GulfShores l7_firewall src=135.199.164.59 dst=152.192.166.3 protocol=udp sport=36289 dport=53 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 36289, "protocol": 17, "streamName": "meraki_l7_firewall", "clientIP": "135.199.164.59", "serverIP": "152.192.166.3" }
Create a JSON artifact from the message
<134>Original Address=69.57.50.101 1 1660851333.462193461 M53_MX67C_GulfShores l7_firewall src=135.199.164.59 dst=152.192.166.3 protocol=udp sport=36289 dport=53 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=69.57.50.101 1 1660851333.462193461 M53_MX67C_GulfShores l7_firewall src=135.199.164.59 dst=152.192.166.3 protocol=udp sport=36289 dport=53 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 53 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 36289 protocol: 17 streamName: meraki_l7_firewall clientIP: 135.199.164.59 serverIP: 152.192.166.3
Explain this syslog message
<134>Original Address=69.57.50.101 1 1660851332.458783581 M53_MX67C_GulfShores l7_firewall src=156.94.160.241 dst=102.176.151.208 protocol=udp sport=36289 dport=53 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 53, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=69.57.50.101 1 1660851332.458783581 M53_MX67C_GulfShores l7_firewall src=156.94.160.241 dst=102.176.151.208 protocol=udp sport=36289 dport=53 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 36289, "protocol": 17, "streamName": "meraki_l7_firewall", "clientIP": "156.94.160.241", "serverIP": "102.176.151.208" }
Create a JSON artifact from the message
<134>Original Address=69.57.50.101 1 1660851332.458783581 M53_MX67C_GulfShores l7_firewall src=156.94.160.241 dst=102.176.151.208 protocol=udp sport=36289 dport=53 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=69.57.50.101 1 1660851332.458783581 M53_MX67C_GulfShores l7_firewall src=156.94.160.241 dst=102.176.151.208 protocol=udp sport=36289 dport=53 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 53 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 36289 protocol: 17 streamName: meraki_l7_firewall clientIP: 156.94.160.241 serverIP: 102.176.151.208
Explain this syslog message
<134>Original Address=69.57.50.101 1 1660851332.458783581 M53_MX67C_GulfShores l7_firewall src=180.175.55.60 dst=24.176.37.58 protocol=udp sport=36289 dport=53 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 53, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=69.57.50.101 1 1660851332.458783581 M53_MX67C_GulfShores l7_firewall src=180.175.55.60 dst=24.176.37.58 protocol=udp sport=36289 dport=53 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 36289, "protocol": 17, "streamName": "meraki_l7_firewall", "clientIP": "180.175.55.60", "serverIP": "24.176.37.58" }
Create a JSON artifact from the message
<134>Original Address=69.57.50.101 1 1660851332.458783581 M53_MX67C_GulfShores l7_firewall src=180.175.55.60 dst=24.176.37.58 protocol=udp sport=36289 dport=53 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=69.57.50.101 1 1660851332.458783581 M53_MX67C_GulfShores l7_firewall src=180.175.55.60 dst=24.176.37.58 protocol=udp sport=36289 dport=53 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 53 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 36289 protocol: 17 streamName: meraki_l7_firewall clientIP: 180.175.55.60 serverIP: 24.176.37.58
Explain this syslog message
<134>Original Address=69.57.50.101 1 1660851332.458783581 M53_MX67C_GulfShores l7_firewall src=147.136.236.98 dst=125.197.74.33 protocol=udp sport=36289 dport=53 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 53, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=69.57.50.101 1 1660851332.458783581 M53_MX67C_GulfShores l7_firewall src=147.136.236.98 dst=125.197.74.33 protocol=udp sport=36289 dport=53 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 36289, "protocol": 17, "streamName": "meraki_l7_firewall", "clientIP": "147.136.236.98", "serverIP": "125.197.74.33" }
Create a JSON artifact from the message
<134>Original Address=69.57.50.101 1 1660851332.458783581 M53_MX67C_GulfShores l7_firewall src=147.136.236.98 dst=125.197.74.33 protocol=udp sport=36289 dport=53 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=69.57.50.101 1 1660851332.458783581 M53_MX67C_GulfShores l7_firewall src=147.136.236.98 dst=125.197.74.33 protocol=udp sport=36289 dport=53 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 53 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 36289 protocol: 17 streamName: meraki_l7_firewall clientIP: 147.136.236.98 serverIP: 125.197.74.33
Explain this syslog message
<134>Original Address=69.57.50.101 1 1660851332.458783581 M53_MX67C_GulfShores l7_firewall src=118.51.186.2 dst=131.83.19.99 protocol=udp sport=36289 dport=53 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 53, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=69.57.50.101 1 1660851332.458783581 M53_MX67C_GulfShores l7_firewall src=118.51.186.2 dst=131.83.19.99 protocol=udp sport=36289 dport=53 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 36289, "protocol": 17, "streamName": "meraki_l7_firewall", "clientIP": "118.51.186.2", "serverIP": "131.83.19.99" }
Create a JSON artifact from the message
<134>Original Address=69.57.50.101 1 1660851332.458783581 M53_MX67C_GulfShores l7_firewall src=118.51.186.2 dst=131.83.19.99 protocol=udp sport=36289 dport=53 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=69.57.50.101 1 1660851332.458783581 M53_MX67C_GulfShores l7_firewall src=118.51.186.2 dst=131.83.19.99 protocol=udp sport=36289 dport=53 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 53 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 36289 protocol: 17 streamName: meraki_l7_firewall clientIP: 118.51.186.2 serverIP: 131.83.19.99
Explain this syslog message
<134>Original Address=173.235.41.202 1 1660362736.422534734 M55_MX67C_Hattiesburg l7_firewall src=244.69.58.235 dst=239.71.6.170 protocol=udp sport=54676 dport=64361 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 54676, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=173.235.41.202 1 1660362736.422534734 M55_MX67C_Hattiesburg l7_firewall src=244.69.58.235 dst=239.71.6.170 protocol=udp sport=54676 dport=64361 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 64361, "protocol": 17, "streamName": "meraki_l7_firewall", "clientIP": "239.71.6.170", "serverIP": "244.69.58.235" }
Create a JSON artifact from the message