input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
<185>Feb 6 17:23:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=5.120.114.110 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=137.139.100.114 spt=37156 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 17:23:38 rt=1675725818049 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=186290ac8c1-6c0226d5 cn2=37156 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=137.139.100.114 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| {
"senderhost": "10.0.0.250",
"serverport": 443,
"severitylabel": "alert",
"tags": [
"RuleID:global",
"barracuda_waf_GEO_IP_BLOCK",
"AttackGroup:Forceful Browsing",
"ProxyIP:185.224.128.219",
"RuleType:GLOBAL",
"barracuda_waf",
"rfc3164",
"GEO_IP_BLOCK",
"cef",
"SessionID:-",
"FollowUpAction:NONE"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<185>Feb 6 17:23:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=5.120.114.110 dpt=443 act=DENY msg=[GeoIP Policy Match] duser=\"-\" src=137.139.100.114 spt=37156 requestMethod=GET app=TLSv1.3 requestContext=\"-\" start=Feb 06 2023 17:23:38 rt=1675725818049 request=/_asterisk/ requestClientApplication=\"python-requests/2.22.0\" dvchost=WAFirewall externalId=186290ac8c1-6c0226d5 cn2=37156 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=137.139.100.114 cs5Label=ProxyIP cs6=\"-\" cs6Label=SessionID \n",
"localstarttime": "1675725818049 ",
"sensitivity": "normal",
"localhostname": "WAFirewall",
"priority": 185,
"facilitylabel": "local7",
"messagetype": "GEO_IP_BLOCK",
"severitycode": 9,
"fqdn": "/_asterisk/",
"clientport": 37156,
"vendorcode": "342",
"action": "block",
"facilitycode": 23,
"streamName": "barracuda_waf",
"clientIP": "137.139.100.114",
"serverIP": "5.120.114.110",
"userName": "-"
} | Create a JSON artifact from the message |
<185>Feb 6 17:23:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=5.120.114.110 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=137.139.100.114 spt=37156 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 17:23:38 rt=1675725818049 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=186290ac8c1-6c0226d5 cn2=37156 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=137.139.100.114 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| Product: Barracuda WAF
Vendor: Barracuda | Identify this syslog message |
<185>Feb 6 17:23:38 WAFirewall CEF:0|Barracuda|WAF|1200|342|GEO_IP_BLOCK|1|cat=WF dst=5.120.114.110 dpt=443 act=DENY msg=[GeoIP Policy Match] duser="-" src=137.139.100.114 spt=37156 requestMethod=GET app=TLSv1.3 requestContext="-" start=Feb 06 2023 17:23:38 rt=1675725818049 request=/_asterisk/ requestClientApplication="python-requests/2.22.0" dvchost=WAFirewall externalId=186290ac8c1-6c0226d5 cn2=37156 cn2Label=ProxyPort cs1=global cs1Label=RuleID cs2=NONE cs2Label=FollowUpAction cs3=GLOBAL cs3Label=RuleType cs4=Forceful Browsing cs4Label=AttackGroup cs5=137.139.100.114 cs5Label=ProxyIP cs6="-" cs6Label=SessionID
| This is a syslog message from a product called Barracuda WAF by Barracuda. The following fields were extracted from the message:
senderhost: 10.0.0.250
serverport: 443
severitylabel: alert
tags: ['RuleID:global', 'barracuda_waf_GEO_IP_BLOCK', 'AttackGroup:Forceful Browsing', 'ProxyIP:185.224.128.219', 'RuleType:GLOBAL', 'barracuda_waf', 'rfc3164', 'GEO_IP_BLOCK', 'cef', 'SessionID:-', 'FollowUpAction:NONE']
productids: [0]
sourceinfo: unknown
localstarttime: 1675725818049
sensitivity: normal
localhostname: WAFirewall
priority: 185
facilitylabel: local7
messagetype: GEO_IP_BLOCK
severitycode: 9
fqdn: /_asterisk/
clientport: 37156
vendorcode: 342
action: block
facilitycode: 23
streamName: barracuda_waf
clientIP: 137.139.100.114
serverIP: 5.120.114.110
userName: - | Explain this syslog message |
<134>Original Address=74.95.48.161 1 1660606064.342201583 M83_MX67C_MuscleShoals l7_firewall src=136.137.251.143 dst=26.183.186.173 protocol=tcp sport=50655 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=74.95.48.161 1 1660606064.342201583 M83_MX67C_MuscleShoals l7_firewall src=136.137.251.143 dst=26.183.186.173 protocol=tcp sport=50655 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 50655,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "136.137.251.143",
"serverIP": "26.183.186.173"
} | Create a JSON artifact from the message |
<134>Original Address=74.95.48.161 1 1660606064.342201583 M83_MX67C_MuscleShoals l7_firewall src=136.137.251.143 dst=26.183.186.173 protocol=tcp sport=50655 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=74.95.48.161 1 1660606064.342201583 M83_MX67C_MuscleShoals l7_firewall src=136.137.251.143 dst=26.183.186.173 protocol=tcp sport=50655 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 50655
protocol: 6
streamName: meraki_l7_firewall
clientIP: 136.137.251.143
serverIP: 26.183.186.173 | Explain this syslog message |
<134>Original Address=74.95.48.161 1 1660606064.342201583 M83_MX67C_MuscleShoals l7_firewall src=58.51.232.148 dst=164.52.192.160 protocol=tcp sport=50655 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=74.95.48.161 1 1660606064.342201583 M83_MX67C_MuscleShoals l7_firewall src=58.51.232.148 dst=164.52.192.160 protocol=tcp sport=50655 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 50655,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "58.51.232.148",
"serverIP": "164.52.192.160"
} | Create a JSON artifact from the message |
<134>Original Address=74.95.48.161 1 1660606064.342201583 M83_MX67C_MuscleShoals l7_firewall src=58.51.232.148 dst=164.52.192.160 protocol=tcp sport=50655 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=74.95.48.161 1 1660606064.342201583 M83_MX67C_MuscleShoals l7_firewall src=58.51.232.148 dst=164.52.192.160 protocol=tcp sport=50655 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 50655
protocol: 6
streamName: meraki_l7_firewall
clientIP: 58.51.232.148
serverIP: 164.52.192.160 | Explain this syslog message |
<134>Original Address=74.95.48.161 1 1660606064.342201583 M83_MX67C_MuscleShoals l7_firewall src=26.166.241.197 dst=143.129.160.127 protocol=tcp sport=50655 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=74.95.48.161 1 1660606064.342201583 M83_MX67C_MuscleShoals l7_firewall src=26.166.241.197 dst=143.129.160.127 protocol=tcp sport=50655 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 50655,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "26.166.241.197",
"serverIP": "143.129.160.127"
} | Create a JSON artifact from the message |
<134>Original Address=74.95.48.161 1 1660606064.342201583 M83_MX67C_MuscleShoals l7_firewall src=26.166.241.197 dst=143.129.160.127 protocol=tcp sport=50655 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=74.95.48.161 1 1660606064.342201583 M83_MX67C_MuscleShoals l7_firewall src=26.166.241.197 dst=143.129.160.127 protocol=tcp sport=50655 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 50655
protocol: 6
streamName: meraki_l7_firewall
clientIP: 26.166.241.197
serverIP: 143.129.160.127 | Explain this syslog message |
<134>Original Address=74.95.48.161 1 1660606064.342201583 M83_MX67C_MuscleShoals l7_firewall src=40.118.243.41 dst=7.14.39.51 protocol=tcp sport=50655 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=74.95.48.161 1 1660606064.342201583 M83_MX67C_MuscleShoals l7_firewall src=40.118.243.41 dst=7.14.39.51 protocol=tcp sport=50655 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 50655,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "40.118.243.41",
"serverIP": "7.14.39.51"
} | Create a JSON artifact from the message |
<134>Original Address=74.95.48.161 1 1660606064.342201583 M83_MX67C_MuscleShoals l7_firewall src=40.118.243.41 dst=7.14.39.51 protocol=tcp sport=50655 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=74.95.48.161 1 1660606064.342201583 M83_MX67C_MuscleShoals l7_firewall src=40.118.243.41 dst=7.14.39.51 protocol=tcp sport=50655 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 50655
protocol: 6
streamName: meraki_l7_firewall
clientIP: 40.118.243.41
serverIP: 7.14.39.51 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1660138115.462411563 M61_MX67C_Savannah l7_firewall src=174.49.61.74 dst=142.142.111.211 protocol=tcp sport=35674 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1660138115.462411563 M61_MX67C_Savannah l7_firewall src=174.49.61.74 dst=142.142.111.211 protocol=tcp sport=35674 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 35674,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "174.49.61.74",
"serverIP": "142.142.111.211"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1660138115.462411563 M61_MX67C_Savannah l7_firewall src=174.49.61.74 dst=142.142.111.211 protocol=tcp sport=35674 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1660138115.462411563 M61_MX67C_Savannah l7_firewall src=174.49.61.74 dst=142.142.111.211 protocol=tcp sport=35674 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 35674
protocol: 6
streamName: meraki_l7_firewall
clientIP: 174.49.61.74
serverIP: 142.142.111.211 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1660138115.462411563 M61_MX67C_Savannah l7_firewall src=204.146.159.153 dst=3.51.71.136 protocol=tcp sport=35674 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1660138115.462411563 M61_MX67C_Savannah l7_firewall src=204.146.159.153 dst=3.51.71.136 protocol=tcp sport=35674 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 35674,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "204.146.159.153",
"serverIP": "3.51.71.136"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1660138115.462411563 M61_MX67C_Savannah l7_firewall src=204.146.159.153 dst=3.51.71.136 protocol=tcp sport=35674 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1660138115.462411563 M61_MX67C_Savannah l7_firewall src=204.146.159.153 dst=3.51.71.136 protocol=tcp sport=35674 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 35674
protocol: 6
streamName: meraki_l7_firewall
clientIP: 204.146.159.153
serverIP: 3.51.71.136 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1660138115.462411563 M61_MX67C_Savannah l7_firewall src=64.54.251.7 dst=50.124.195.115 protocol=tcp sport=35674 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1660138115.462411563 M61_MX67C_Savannah l7_firewall src=64.54.251.7 dst=50.124.195.115 protocol=tcp sport=35674 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 35674,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "64.54.251.7",
"serverIP": "50.124.195.115"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1660138115.462411563 M61_MX67C_Savannah l7_firewall src=64.54.251.7 dst=50.124.195.115 protocol=tcp sport=35674 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1660138115.462411563 M61_MX67C_Savannah l7_firewall src=64.54.251.7 dst=50.124.195.115 protocol=tcp sport=35674 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 35674
protocol: 6
streamName: meraki_l7_firewall
clientIP: 64.54.251.7
serverIP: 50.124.195.115 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1660138115.462411563 M61_MX67C_Savannah l7_firewall src=155.185.216.151 dst=166.102.226.51 protocol=tcp sport=35674 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1660138115.462411563 M61_MX67C_Savannah l7_firewall src=155.185.216.151 dst=166.102.226.51 protocol=tcp sport=35674 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 35674,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "155.185.216.151",
"serverIP": "166.102.226.51"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1660138115.462411563 M61_MX67C_Savannah l7_firewall src=155.185.216.151 dst=166.102.226.51 protocol=tcp sport=35674 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1660138115.462411563 M61_MX67C_Savannah l7_firewall src=155.185.216.151 dst=166.102.226.51 protocol=tcp sport=35674 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 35674
protocol: 6
streamName: meraki_l7_firewall
clientIP: 155.185.216.151
serverIP: 166.102.226.51 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1660137823.635201563 M61_MX67C_Savannah l7_firewall src=211.40.235.100 dst=135.114.229.141 protocol=tcp sport=42532 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1660137823.635201563 M61_MX67C_Savannah l7_firewall src=211.40.235.100 dst=135.114.229.141 protocol=tcp sport=42532 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 42532,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "211.40.235.100",
"serverIP": "135.114.229.141"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1660137823.635201563 M61_MX67C_Savannah l7_firewall src=211.40.235.100 dst=135.114.229.141 protocol=tcp sport=42532 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1660137823.635201563 M61_MX67C_Savannah l7_firewall src=211.40.235.100 dst=135.114.229.141 protocol=tcp sport=42532 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 42532
protocol: 6
streamName: meraki_l7_firewall
clientIP: 211.40.235.100
serverIP: 135.114.229.141 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1660137823.635201563 M61_MX67C_Savannah l7_firewall src=128.88.71.159 dst=192.176.154.88 protocol=tcp sport=42532 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1660137823.635201563 M61_MX67C_Savannah l7_firewall src=128.88.71.159 dst=192.176.154.88 protocol=tcp sport=42532 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 42532,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "128.88.71.159",
"serverIP": "192.176.154.88"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1660137823.635201563 M61_MX67C_Savannah l7_firewall src=128.88.71.159 dst=192.176.154.88 protocol=tcp sport=42532 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1660137823.635201563 M61_MX67C_Savannah l7_firewall src=128.88.71.159 dst=192.176.154.88 protocol=tcp sport=42532 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 42532
protocol: 6
streamName: meraki_l7_firewall
clientIP: 128.88.71.159
serverIP: 192.176.154.88 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1660137823.635201563 M61_MX67C_Savannah l7_firewall src=7.36.111.160 dst=115.35.49.96 protocol=tcp sport=42532 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1660137823.635201563 M61_MX67C_Savannah l7_firewall src=7.36.111.160 dst=115.35.49.96 protocol=tcp sport=42532 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 42532,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "7.36.111.160",
"serverIP": "115.35.49.96"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1660137823.635201563 M61_MX67C_Savannah l7_firewall src=7.36.111.160 dst=115.35.49.96 protocol=tcp sport=42532 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1660137823.635201563 M61_MX67C_Savannah l7_firewall src=7.36.111.160 dst=115.35.49.96 protocol=tcp sport=42532 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 42532
protocol: 6
streamName: meraki_l7_firewall
clientIP: 7.36.111.160
serverIP: 115.35.49.96 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1660137823.635201563 M61_MX67C_Savannah l7_firewall src=168.80.29.51 dst=124.120.144.251 protocol=tcp sport=42532 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1660137823.635201563 M61_MX67C_Savannah l7_firewall src=168.80.29.51 dst=124.120.144.251 protocol=tcp sport=42532 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 42532,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "168.80.29.51",
"serverIP": "124.120.144.251"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1660137823.635201563 M61_MX67C_Savannah l7_firewall src=168.80.29.51 dst=124.120.144.251 protocol=tcp sport=42532 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1660137823.635201563 M61_MX67C_Savannah l7_firewall src=168.80.29.51 dst=124.120.144.251 protocol=tcp sport=42532 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 42532
protocol: 6
streamName: meraki_l7_firewall
clientIP: 168.80.29.51
serverIP: 124.120.144.251 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1660140553.908188177 M61_MX67C_Savannah l7_firewall src=163.105.254.166 dst=117.253.32.114 protocol=tcp sport=52960 dport=5223 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 5223,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1660140553.908188177 M61_MX67C_Savannah l7_firewall src=163.105.254.166 dst=117.253.32.114 protocol=tcp sport=52960 dport=5223 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 52960,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "163.105.254.166",
"serverIP": "117.253.32.114"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1660140553.908188177 M61_MX67C_Savannah l7_firewall src=163.105.254.166 dst=117.253.32.114 protocol=tcp sport=52960 dport=5223 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1660140553.908188177 M61_MX67C_Savannah l7_firewall src=163.105.254.166 dst=117.253.32.114 protocol=tcp sport=52960 dport=5223 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 5223
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 52960
protocol: 6
streamName: meraki_l7_firewall
clientIP: 163.105.254.166
serverIP: 117.253.32.114 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1660140553.908188177 M61_MX67C_Savannah l7_firewall src=97.241.250.94 dst=148.147.100.238 protocol=tcp sport=52960 dport=5223 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 5223,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1660140553.908188177 M61_MX67C_Savannah l7_firewall src=97.241.250.94 dst=148.147.100.238 protocol=tcp sport=52960 dport=5223 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 52960,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "97.241.250.94",
"serverIP": "148.147.100.238"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1660140553.908188177 M61_MX67C_Savannah l7_firewall src=97.241.250.94 dst=148.147.100.238 protocol=tcp sport=52960 dport=5223 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1660140553.908188177 M61_MX67C_Savannah l7_firewall src=97.241.250.94 dst=148.147.100.238 protocol=tcp sport=52960 dport=5223 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 5223
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 52960
protocol: 6
streamName: meraki_l7_firewall
clientIP: 97.241.250.94
serverIP: 148.147.100.238 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1660140553.908188177 M61_MX67C_Savannah l7_firewall src=127.114.38.185 dst=17.103.149.255 protocol=tcp sport=52960 dport=5223 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 5223,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1660140553.908188177 M61_MX67C_Savannah l7_firewall src=127.114.38.185 dst=17.103.149.255 protocol=tcp sport=52960 dport=5223 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 52960,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "127.114.38.185",
"serverIP": "17.103.149.255"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1660140553.908188177 M61_MX67C_Savannah l7_firewall src=127.114.38.185 dst=17.103.149.255 protocol=tcp sport=52960 dport=5223 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1660140553.908188177 M61_MX67C_Savannah l7_firewall src=127.114.38.185 dst=17.103.149.255 protocol=tcp sport=52960 dport=5223 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 5223
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 52960
protocol: 6
streamName: meraki_l7_firewall
clientIP: 127.114.38.185
serverIP: 17.103.149.255 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1660140553.908188177 M61_MX67C_Savannah l7_firewall src=37.33.85.96 dst=235.130.78.108 protocol=tcp sport=52960 dport=5223 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 5223,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1660140553.908188177 M61_MX67C_Savannah l7_firewall src=37.33.85.96 dst=235.130.78.108 protocol=tcp sport=52960 dport=5223 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 52960,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "37.33.85.96",
"serverIP": "235.130.78.108"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1660140553.908188177 M61_MX67C_Savannah l7_firewall src=37.33.85.96 dst=235.130.78.108 protocol=tcp sport=52960 dport=5223 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1660140553.908188177 M61_MX67C_Savannah l7_firewall src=37.33.85.96 dst=235.130.78.108 protocol=tcp sport=52960 dport=5223 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 5223
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 52960
protocol: 6
streamName: meraki_l7_firewall
clientIP: 37.33.85.96
serverIP: 235.130.78.108 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1660138115.287604843 M61_MX67C_Savannah l7_firewall src=244.184.254.32 dst=11.73.115.4 protocol=tcp sport=49865 dport=80 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1660138115.287604843 M61_MX67C_Savannah l7_firewall src=244.184.254.32 dst=11.73.115.4 protocol=tcp sport=49865 dport=80 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 49865,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "244.184.254.32",
"serverIP": "11.73.115.4"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1660138115.287604843 M61_MX67C_Savannah l7_firewall src=244.184.254.32 dst=11.73.115.4 protocol=tcp sport=49865 dport=80 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1660138115.287604843 M61_MX67C_Savannah l7_firewall src=244.184.254.32 dst=11.73.115.4 protocol=tcp sport=49865 dport=80 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 49865
protocol: 6
streamName: meraki_l7_firewall
clientIP: 244.184.254.32
serverIP: 11.73.115.4 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1660138115.287604843 M61_MX67C_Savannah l7_firewall src=60.152.164.148 dst=41.165.235.193 protocol=tcp sport=49865 dport=80 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1660138115.287604843 M61_MX67C_Savannah l7_firewall src=60.152.164.148 dst=41.165.235.193 protocol=tcp sport=49865 dport=80 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 49865,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "60.152.164.148",
"serverIP": "41.165.235.193"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1660138115.287604843 M61_MX67C_Savannah l7_firewall src=60.152.164.148 dst=41.165.235.193 protocol=tcp sport=49865 dport=80 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1660138115.287604843 M61_MX67C_Savannah l7_firewall src=60.152.164.148 dst=41.165.235.193 protocol=tcp sport=49865 dport=80 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 49865
protocol: 6
streamName: meraki_l7_firewall
clientIP: 60.152.164.148
serverIP: 41.165.235.193 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1660138115.287604843 M61_MX67C_Savannah l7_firewall src=245.161.4.145 dst=208.228.31.248 protocol=tcp sport=49865 dport=80 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1660138115.287604843 M61_MX67C_Savannah l7_firewall src=245.161.4.145 dst=208.228.31.248 protocol=tcp sport=49865 dport=80 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 49865,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "245.161.4.145",
"serverIP": "208.228.31.248"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1660138115.287604843 M61_MX67C_Savannah l7_firewall src=245.161.4.145 dst=208.228.31.248 protocol=tcp sport=49865 dport=80 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1660138115.287604843 M61_MX67C_Savannah l7_firewall src=245.161.4.145 dst=208.228.31.248 protocol=tcp sport=49865 dport=80 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 49865
protocol: 6
streamName: meraki_l7_firewall
clientIP: 245.161.4.145
serverIP: 208.228.31.248 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1660138115.287604843 M61_MX67C_Savannah l7_firewall src=160.160.52.229 dst=91.254.89.58 protocol=tcp sport=49865 dport=80 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1660138115.287604843 M61_MX67C_Savannah l7_firewall src=160.160.52.229 dst=91.254.89.58 protocol=tcp sport=49865 dport=80 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 49865,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "160.160.52.229",
"serverIP": "91.254.89.58"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1660138115.287604843 M61_MX67C_Savannah l7_firewall src=160.160.52.229 dst=91.254.89.58 protocol=tcp sport=49865 dport=80 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1660138115.287604843 M61_MX67C_Savannah l7_firewall src=160.160.52.229 dst=91.254.89.58 protocol=tcp sport=49865 dport=80 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 49865
protocol: 6
streamName: meraki_l7_firewall
clientIP: 160.160.52.229
serverIP: 91.254.89.58 | Explain this syslog message |
<134>Original Address=50.243.215.201 1 1660141465.123730314 M92_MX67C_MECBraselton l7_firewall src=119.87.53.217 dst=206.145.180.72 protocol=tcp sport=51010 dport=80 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=50.243.215.201 1 1660141465.123730314 M92_MX67C_MECBraselton l7_firewall src=119.87.53.217 dst=206.145.180.72 protocol=tcp sport=51010 dport=80 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 51010,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "119.87.53.217",
"serverIP": "206.145.180.72"
} | Create a JSON artifact from the message |
<134>Original Address=50.243.215.201 1 1660141465.123730314 M92_MX67C_MECBraselton l7_firewall src=119.87.53.217 dst=206.145.180.72 protocol=tcp sport=51010 dport=80 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=50.243.215.201 1 1660141465.123730314 M92_MX67C_MECBraselton l7_firewall src=119.87.53.217 dst=206.145.180.72 protocol=tcp sport=51010 dport=80 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 51010
protocol: 6
streamName: meraki_l7_firewall
clientIP: 119.87.53.217
serverIP: 206.145.180.72 | Explain this syslog message |
<134>Original Address=50.243.215.201 1 1660141465.123730314 M92_MX67C_MECBraselton l7_firewall src=195.185.169.131 dst=8.217.46.93 protocol=tcp sport=51010 dport=80 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=50.243.215.201 1 1660141465.123730314 M92_MX67C_MECBraselton l7_firewall src=195.185.169.131 dst=8.217.46.93 protocol=tcp sport=51010 dport=80 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 51010,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "195.185.169.131",
"serverIP": "8.217.46.93"
} | Create a JSON artifact from the message |
<134>Original Address=50.243.215.201 1 1660141465.123730314 M92_MX67C_MECBraselton l7_firewall src=195.185.169.131 dst=8.217.46.93 protocol=tcp sport=51010 dport=80 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=50.243.215.201 1 1660141465.123730314 M92_MX67C_MECBraselton l7_firewall src=195.185.169.131 dst=8.217.46.93 protocol=tcp sport=51010 dport=80 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 51010
protocol: 6
streamName: meraki_l7_firewall
clientIP: 195.185.169.131
serverIP: 8.217.46.93 | Explain this syslog message |
<134>Original Address=50.243.215.201 1 1660141465.123730314 M92_MX67C_MECBraselton l7_firewall src=248.116.2.189 dst=218.181.217.174 protocol=tcp sport=51010 dport=80 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=50.243.215.201 1 1660141465.123730314 M92_MX67C_MECBraselton l7_firewall src=248.116.2.189 dst=218.181.217.174 protocol=tcp sport=51010 dport=80 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 51010,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "248.116.2.189",
"serverIP": "218.181.217.174"
} | Create a JSON artifact from the message |
<134>Original Address=50.243.215.201 1 1660141465.123730314 M92_MX67C_MECBraselton l7_firewall src=248.116.2.189 dst=218.181.217.174 protocol=tcp sport=51010 dport=80 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=50.243.215.201 1 1660141465.123730314 M92_MX67C_MECBraselton l7_firewall src=248.116.2.189 dst=218.181.217.174 protocol=tcp sport=51010 dport=80 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 51010
protocol: 6
streamName: meraki_l7_firewall
clientIP: 248.116.2.189
serverIP: 218.181.217.174 | Explain this syslog message |
<134>Original Address=50.243.215.201 1 1660141465.123730314 M92_MX67C_MECBraselton l7_firewall src=133.191.229.209 dst=87.105.31.255 protocol=tcp sport=51010 dport=80 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=50.243.215.201 1 1660141465.123730314 M92_MX67C_MECBraselton l7_firewall src=133.191.229.209 dst=87.105.31.255 protocol=tcp sport=51010 dport=80 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 51010,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "133.191.229.209",
"serverIP": "87.105.31.255"
} | Create a JSON artifact from the message |
<134>Original Address=50.243.215.201 1 1660141465.123730314 M92_MX67C_MECBraselton l7_firewall src=133.191.229.209 dst=87.105.31.255 protocol=tcp sport=51010 dport=80 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=50.243.215.201 1 1660141465.123730314 M92_MX67C_MECBraselton l7_firewall src=133.191.229.209 dst=87.105.31.255 protocol=tcp sport=51010 dport=80 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 51010
protocol: 6
streamName: meraki_l7_firewall
clientIP: 133.191.229.209
serverIP: 87.105.31.255 | Explain this syslog message |
<134>Original Address=69.57.50.101 1 1660851333.462193461 M53_MX67C_GulfShores l7_firewall src=46.127.164.182 dst=33.160.175.177 protocol=udp sport=36289 dport=53 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 53,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=69.57.50.101 1 1660851333.462193461 M53_MX67C_GulfShores l7_firewall src=46.127.164.182 dst=33.160.175.177 protocol=udp sport=36289 dport=53 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 36289,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "46.127.164.182",
"serverIP": "33.160.175.177"
} | Create a JSON artifact from the message |
<134>Original Address=69.57.50.101 1 1660851333.462193461 M53_MX67C_GulfShores l7_firewall src=46.127.164.182 dst=33.160.175.177 protocol=udp sport=36289 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=69.57.50.101 1 1660851333.462193461 M53_MX67C_GulfShores l7_firewall src=46.127.164.182 dst=33.160.175.177 protocol=udp sport=36289 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 53
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 36289
protocol: 17
streamName: meraki_l7_firewall
clientIP: 46.127.164.182
serverIP: 33.160.175.177 | Explain this syslog message |
<134>Original Address=69.57.50.101 1 1660851333.462193461 M53_MX67C_GulfShores l7_firewall src=108.165.240.185 dst=83.0.187.167 protocol=udp sport=36289 dport=53 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 53,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=69.57.50.101 1 1660851333.462193461 M53_MX67C_GulfShores l7_firewall src=108.165.240.185 dst=83.0.187.167 protocol=udp sport=36289 dport=53 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 36289,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "108.165.240.185",
"serverIP": "83.0.187.167"
} | Create a JSON artifact from the message |
<134>Original Address=69.57.50.101 1 1660851333.462193461 M53_MX67C_GulfShores l7_firewall src=108.165.240.185 dst=83.0.187.167 protocol=udp sport=36289 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=69.57.50.101 1 1660851333.462193461 M53_MX67C_GulfShores l7_firewall src=108.165.240.185 dst=83.0.187.167 protocol=udp sport=36289 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 53
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 36289
protocol: 17
streamName: meraki_l7_firewall
clientIP: 108.165.240.185
serverIP: 83.0.187.167 | Explain this syslog message |
<134>Original Address=69.57.50.101 1 1660851333.462193461 M53_MX67C_GulfShores l7_firewall src=126.232.51.216 dst=68.42.143.140 protocol=udp sport=36289 dport=53 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 53,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=69.57.50.101 1 1660851333.462193461 M53_MX67C_GulfShores l7_firewall src=126.232.51.216 dst=68.42.143.140 protocol=udp sport=36289 dport=53 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 36289,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "126.232.51.216",
"serverIP": "68.42.143.140"
} | Create a JSON artifact from the message |
<134>Original Address=69.57.50.101 1 1660851333.462193461 M53_MX67C_GulfShores l7_firewall src=126.232.51.216 dst=68.42.143.140 protocol=udp sport=36289 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=69.57.50.101 1 1660851333.462193461 M53_MX67C_GulfShores l7_firewall src=126.232.51.216 dst=68.42.143.140 protocol=udp sport=36289 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 53
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 36289
protocol: 17
streamName: meraki_l7_firewall
clientIP: 126.232.51.216
serverIP: 68.42.143.140 | Explain this syslog message |
<134>Original Address=69.57.50.101 1 1660851333.462193461 M53_MX67C_GulfShores l7_firewall src=135.199.164.59 dst=152.192.166.3 protocol=udp sport=36289 dport=53 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 53,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=69.57.50.101 1 1660851333.462193461 M53_MX67C_GulfShores l7_firewall src=135.199.164.59 dst=152.192.166.3 protocol=udp sport=36289 dport=53 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 36289,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "135.199.164.59",
"serverIP": "152.192.166.3"
} | Create a JSON artifact from the message |
<134>Original Address=69.57.50.101 1 1660851333.462193461 M53_MX67C_GulfShores l7_firewall src=135.199.164.59 dst=152.192.166.3 protocol=udp sport=36289 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=69.57.50.101 1 1660851333.462193461 M53_MX67C_GulfShores l7_firewall src=135.199.164.59 dst=152.192.166.3 protocol=udp sport=36289 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 53
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 36289
protocol: 17
streamName: meraki_l7_firewall
clientIP: 135.199.164.59
serverIP: 152.192.166.3 | Explain this syslog message |
<134>Original Address=69.57.50.101 1 1660851332.458783581 M53_MX67C_GulfShores l7_firewall src=156.94.160.241 dst=102.176.151.208 protocol=udp sport=36289 dport=53 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 53,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=69.57.50.101 1 1660851332.458783581 M53_MX67C_GulfShores l7_firewall src=156.94.160.241 dst=102.176.151.208 protocol=udp sport=36289 dport=53 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 36289,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "156.94.160.241",
"serverIP": "102.176.151.208"
} | Create a JSON artifact from the message |
<134>Original Address=69.57.50.101 1 1660851332.458783581 M53_MX67C_GulfShores l7_firewall src=156.94.160.241 dst=102.176.151.208 protocol=udp sport=36289 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=69.57.50.101 1 1660851332.458783581 M53_MX67C_GulfShores l7_firewall src=156.94.160.241 dst=102.176.151.208 protocol=udp sport=36289 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 53
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 36289
protocol: 17
streamName: meraki_l7_firewall
clientIP: 156.94.160.241
serverIP: 102.176.151.208 | Explain this syslog message |
<134>Original Address=69.57.50.101 1 1660851332.458783581 M53_MX67C_GulfShores l7_firewall src=180.175.55.60 dst=24.176.37.58 protocol=udp sport=36289 dport=53 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 53,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=69.57.50.101 1 1660851332.458783581 M53_MX67C_GulfShores l7_firewall src=180.175.55.60 dst=24.176.37.58 protocol=udp sport=36289 dport=53 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 36289,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "180.175.55.60",
"serverIP": "24.176.37.58"
} | Create a JSON artifact from the message |
<134>Original Address=69.57.50.101 1 1660851332.458783581 M53_MX67C_GulfShores l7_firewall src=180.175.55.60 dst=24.176.37.58 protocol=udp sport=36289 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=69.57.50.101 1 1660851332.458783581 M53_MX67C_GulfShores l7_firewall src=180.175.55.60 dst=24.176.37.58 protocol=udp sport=36289 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 53
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 36289
protocol: 17
streamName: meraki_l7_firewall
clientIP: 180.175.55.60
serverIP: 24.176.37.58 | Explain this syslog message |
<134>Original Address=69.57.50.101 1 1660851332.458783581 M53_MX67C_GulfShores l7_firewall src=147.136.236.98 dst=125.197.74.33 protocol=udp sport=36289 dport=53 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 53,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=69.57.50.101 1 1660851332.458783581 M53_MX67C_GulfShores l7_firewall src=147.136.236.98 dst=125.197.74.33 protocol=udp sport=36289 dport=53 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 36289,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "147.136.236.98",
"serverIP": "125.197.74.33"
} | Create a JSON artifact from the message |
<134>Original Address=69.57.50.101 1 1660851332.458783581 M53_MX67C_GulfShores l7_firewall src=147.136.236.98 dst=125.197.74.33 protocol=udp sport=36289 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=69.57.50.101 1 1660851332.458783581 M53_MX67C_GulfShores l7_firewall src=147.136.236.98 dst=125.197.74.33 protocol=udp sport=36289 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 53
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 36289
protocol: 17
streamName: meraki_l7_firewall
clientIP: 147.136.236.98
serverIP: 125.197.74.33 | Explain this syslog message |
<134>Original Address=69.57.50.101 1 1660851332.458783581 M53_MX67C_GulfShores l7_firewall src=118.51.186.2 dst=131.83.19.99 protocol=udp sport=36289 dport=53 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 53,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=69.57.50.101 1 1660851332.458783581 M53_MX67C_GulfShores l7_firewall src=118.51.186.2 dst=131.83.19.99 protocol=udp sport=36289 dport=53 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 36289,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "118.51.186.2",
"serverIP": "131.83.19.99"
} | Create a JSON artifact from the message |
<134>Original Address=69.57.50.101 1 1660851332.458783581 M53_MX67C_GulfShores l7_firewall src=118.51.186.2 dst=131.83.19.99 protocol=udp sport=36289 dport=53 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=69.57.50.101 1 1660851332.458783581 M53_MX67C_GulfShores l7_firewall src=118.51.186.2 dst=131.83.19.99 protocol=udp sport=36289 dport=53 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 53
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 36289
protocol: 17
streamName: meraki_l7_firewall
clientIP: 118.51.186.2
serverIP: 131.83.19.99 | Explain this syslog message |
<134>Original Address=173.235.41.202 1 1660362736.422534734 M55_MX67C_Hattiesburg l7_firewall src=244.69.58.235 dst=239.71.6.170 protocol=udp sport=54676 dport=64361 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 54676,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=173.235.41.202 1 1660362736.422534734 M55_MX67C_Hattiesburg l7_firewall src=244.69.58.235 dst=239.71.6.170 protocol=udp sport=54676 dport=64361 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 64361,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "239.71.6.170",
"serverIP": "244.69.58.235"
} | Create a JSON artifact from the message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.