input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
<134>Original Address=173.235.41.202 1 1660362736.422534734 M55_MX67C_Hattiesburg l7_firewall src=244.69.58.235 dst=239.71.6.170 protocol=udp sport=54676 dport=64361 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=173.235.41.202 1 1660362736.422534734 M55_MX67C_Hattiesburg l7_firewall src=244.69.58.235 dst=239.71.6.170 protocol=udp sport=54676 dport=64361 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 54676
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 64361
protocol: 17
streamName: meraki_l7_firewall
clientIP: 239.71.6.170
serverIP: 244.69.58.235 | Explain this syslog message |
<134>Original Address=173.235.41.202 1 1660362736.422534734 M55_MX67C_Hattiesburg l7_firewall src=110.226.76.182 dst=47.121.164.215 protocol=udp sport=54676 dport=64361 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 54676,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=173.235.41.202 1 1660362736.422534734 M55_MX67C_Hattiesburg l7_firewall src=110.226.76.182 dst=47.121.164.215 protocol=udp sport=54676 dport=64361 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 64361,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "47.121.164.215",
"serverIP": "110.226.76.182"
} | Create a JSON artifact from the message |
<134>Original Address=173.235.41.202 1 1660362736.422534734 M55_MX67C_Hattiesburg l7_firewall src=110.226.76.182 dst=47.121.164.215 protocol=udp sport=54676 dport=64361 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=173.235.41.202 1 1660362736.422534734 M55_MX67C_Hattiesburg l7_firewall src=110.226.76.182 dst=47.121.164.215 protocol=udp sport=54676 dport=64361 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 54676
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 64361
protocol: 17
streamName: meraki_l7_firewall
clientIP: 47.121.164.215
serverIP: 110.226.76.182 | Explain this syslog message |
<134>Original Address=173.235.41.202 1 1660362736.422534734 M55_MX67C_Hattiesburg l7_firewall src=209.251.121.102 dst=135.33.250.238 protocol=udp sport=54676 dport=64361 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 54676,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=173.235.41.202 1 1660362736.422534734 M55_MX67C_Hattiesburg l7_firewall src=209.251.121.102 dst=135.33.250.238 protocol=udp sport=54676 dport=64361 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 64361,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "135.33.250.238",
"serverIP": "209.251.121.102"
} | Create a JSON artifact from the message |
<134>Original Address=173.235.41.202 1 1660362736.422534734 M55_MX67C_Hattiesburg l7_firewall src=209.251.121.102 dst=135.33.250.238 protocol=udp sport=54676 dport=64361 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=173.235.41.202 1 1660362736.422534734 M55_MX67C_Hattiesburg l7_firewall src=209.251.121.102 dst=135.33.250.238 protocol=udp sport=54676 dport=64361 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 54676
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 64361
protocol: 17
streamName: meraki_l7_firewall
clientIP: 135.33.250.238
serverIP: 209.251.121.102 | Explain this syslog message |
<134>Original Address=173.235.41.202 1 1660362736.422534734 M55_MX67C_Hattiesburg l7_firewall src=236.17.89.248 dst=230.130.91.69 protocol=udp sport=54676 dport=64361 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 54676,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=173.235.41.202 1 1660362736.422534734 M55_MX67C_Hattiesburg l7_firewall src=236.17.89.248 dst=230.130.91.69 protocol=udp sport=54676 dport=64361 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 64361,
"protocol": 17,
"streamName": "meraki_l7_firewall",
"clientIP": "230.130.91.69",
"serverIP": "236.17.89.248"
} | Create a JSON artifact from the message |
<134>Original Address=173.235.41.202 1 1660362736.422534734 M55_MX67C_Hattiesburg l7_firewall src=236.17.89.248 dst=230.130.91.69 protocol=udp sport=54676 dport=64361 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=173.235.41.202 1 1660362736.422534734 M55_MX67C_Hattiesburg l7_firewall src=236.17.89.248 dst=230.130.91.69 protocol=udp sport=54676 dport=64361 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 54676
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 64361
protocol: 17
streamName: meraki_l7_firewall
clientIP: 230.130.91.69
serverIP: 236.17.89.248 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1660876617.196465458 M52_MX67C_Loxley l7_firewall src=149.145.8.179 dst=195.103.221.84 protocol=tcp sport=49918 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1660876617.196465458 M52_MX67C_Loxley l7_firewall src=149.145.8.179 dst=195.103.221.84 protocol=tcp sport=49918 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 49918,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "149.145.8.179",
"serverIP": "195.103.221.84"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1660876617.196465458 M52_MX67C_Loxley l7_firewall src=149.145.8.179 dst=195.103.221.84 protocol=tcp sport=49918 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1660876617.196465458 M52_MX67C_Loxley l7_firewall src=149.145.8.179 dst=195.103.221.84 protocol=tcp sport=49918 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 49918
protocol: 6
streamName: meraki_l7_firewall
clientIP: 149.145.8.179
serverIP: 195.103.221.84 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1660876617.196465458 M52_MX67C_Loxley l7_firewall src=215.39.119.171 dst=192.180.41.112 protocol=tcp sport=49918 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1660876617.196465458 M52_MX67C_Loxley l7_firewall src=215.39.119.171 dst=192.180.41.112 protocol=tcp sport=49918 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 49918,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "215.39.119.171",
"serverIP": "192.180.41.112"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1660876617.196465458 M52_MX67C_Loxley l7_firewall src=215.39.119.171 dst=192.180.41.112 protocol=tcp sport=49918 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1660876617.196465458 M52_MX67C_Loxley l7_firewall src=215.39.119.171 dst=192.180.41.112 protocol=tcp sport=49918 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 49918
protocol: 6
streamName: meraki_l7_firewall
clientIP: 215.39.119.171
serverIP: 192.180.41.112 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1660876617.196465458 M52_MX67C_Loxley l7_firewall src=218.235.114.85 dst=85.185.62.249 protocol=tcp sport=49918 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1660876617.196465458 M52_MX67C_Loxley l7_firewall src=218.235.114.85 dst=85.185.62.249 protocol=tcp sport=49918 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 49918,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "218.235.114.85",
"serverIP": "85.185.62.249"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1660876617.196465458 M52_MX67C_Loxley l7_firewall src=218.235.114.85 dst=85.185.62.249 protocol=tcp sport=49918 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1660876617.196465458 M52_MX67C_Loxley l7_firewall src=218.235.114.85 dst=85.185.62.249 protocol=tcp sport=49918 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 49918
protocol: 6
streamName: meraki_l7_firewall
clientIP: 218.235.114.85
serverIP: 85.185.62.249 | Explain this syslog message |
<134>Original Address=65.119.176.26 1 1660876617.196465458 M52_MX67C_Loxley l7_firewall src=165.250.139.188 dst=80.234.245.176 protocol=tcp sport=49918 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=65.119.176.26 1 1660876617.196465458 M52_MX67C_Loxley l7_firewall src=165.250.139.188 dst=80.234.245.176 protocol=tcp sport=49918 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 49918,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "165.250.139.188",
"serverIP": "80.234.245.176"
} | Create a JSON artifact from the message |
<134>Original Address=65.119.176.26 1 1660876617.196465458 M52_MX67C_Loxley l7_firewall src=165.250.139.188 dst=80.234.245.176 protocol=tcp sport=49918 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=65.119.176.26 1 1660876617.196465458 M52_MX67C_Loxley l7_firewall src=165.250.139.188 dst=80.234.245.176 protocol=tcp sport=49918 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 49918
protocol: 6
streamName: meraki_l7_firewall
clientIP: 165.250.139.188
serverIP: 80.234.245.176 | Explain this syslog message |
<134>Original Address=64.139.91.93 1 1660877143.568235780 M64_MX67C_Augusta l7_firewall src=227.196.47.125 dst=130.91.54.128 protocol=tcp sport=51322 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=64.139.91.93 1 1660877143.568235780 M64_MX67C_Augusta l7_firewall src=227.196.47.125 dst=130.91.54.128 protocol=tcp sport=51322 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 51322,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "227.196.47.125",
"serverIP": "130.91.54.128"
} | Create a JSON artifact from the message |
<134>Original Address=64.139.91.93 1 1660877143.568235780 M64_MX67C_Augusta l7_firewall src=227.196.47.125 dst=130.91.54.128 protocol=tcp sport=51322 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=64.139.91.93 1 1660877143.568235780 M64_MX67C_Augusta l7_firewall src=227.196.47.125 dst=130.91.54.128 protocol=tcp sport=51322 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 51322
protocol: 6
streamName: meraki_l7_firewall
clientIP: 227.196.47.125
serverIP: 130.91.54.128 | Explain this syslog message |
<134>Original Address=64.139.91.93 1 1660877143.568235780 M64_MX67C_Augusta l7_firewall src=36.89.75.142 dst=157.93.225.41 protocol=tcp sport=51322 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=64.139.91.93 1 1660877143.568235780 M64_MX67C_Augusta l7_firewall src=36.89.75.142 dst=157.93.225.41 protocol=tcp sport=51322 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 51322,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "36.89.75.142",
"serverIP": "157.93.225.41"
} | Create a JSON artifact from the message |
<134>Original Address=64.139.91.93 1 1660877143.568235780 M64_MX67C_Augusta l7_firewall src=36.89.75.142 dst=157.93.225.41 protocol=tcp sport=51322 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=64.139.91.93 1 1660877143.568235780 M64_MX67C_Augusta l7_firewall src=36.89.75.142 dst=157.93.225.41 protocol=tcp sport=51322 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 51322
protocol: 6
streamName: meraki_l7_firewall
clientIP: 36.89.75.142
serverIP: 157.93.225.41 | Explain this syslog message |
<134>Original Address=64.139.91.93 1 1660877143.568235780 M64_MX67C_Augusta l7_firewall src=18.133.10.247 dst=118.243.250.122 protocol=tcp sport=51322 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=64.139.91.93 1 1660877143.568235780 M64_MX67C_Augusta l7_firewall src=18.133.10.247 dst=118.243.250.122 protocol=tcp sport=51322 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 51322,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "18.133.10.247",
"serverIP": "118.243.250.122"
} | Create a JSON artifact from the message |
<134>Original Address=64.139.91.93 1 1660877143.568235780 M64_MX67C_Augusta l7_firewall src=18.133.10.247 dst=118.243.250.122 protocol=tcp sport=51322 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=64.139.91.93 1 1660877143.568235780 M64_MX67C_Augusta l7_firewall src=18.133.10.247 dst=118.243.250.122 protocol=tcp sport=51322 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 51322
protocol: 6
streamName: meraki_l7_firewall
clientIP: 18.133.10.247
serverIP: 118.243.250.122 | Explain this syslog message |
<134>Original Address=64.139.91.93 1 1660877143.568235780 M64_MX67C_Augusta l7_firewall src=12.164.79.178 dst=5.58.202.179 protocol=tcp sport=51322 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=64.139.91.93 1 1660877143.568235780 M64_MX67C_Augusta l7_firewall src=12.164.79.178 dst=5.58.202.179 protocol=tcp sport=51322 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 51322,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "12.164.79.178",
"serverIP": "5.58.202.179"
} | Create a JSON artifact from the message |
<134>Original Address=64.139.91.93 1 1660877143.568235780 M64_MX67C_Augusta l7_firewall src=12.164.79.178 dst=5.58.202.179 protocol=tcp sport=51322 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=64.139.91.93 1 1660877143.568235780 M64_MX67C_Augusta l7_firewall src=12.164.79.178 dst=5.58.202.179 protocol=tcp sport=51322 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 51322
protocol: 6
streamName: meraki_l7_firewall
clientIP: 12.164.79.178
serverIP: 5.58.202.179 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1660877139.617139663 M61_MX67C_Savannah l7_firewall src=74.92.116.170 dst=221.41.164.4 protocol=tcp sport=64787 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1660877139.617139663 M61_MX67C_Savannah l7_firewall src=74.92.116.170 dst=221.41.164.4 protocol=tcp sport=64787 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 64787,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "74.92.116.170",
"serverIP": "221.41.164.4"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1660877139.617139663 M61_MX67C_Savannah l7_firewall src=74.92.116.170 dst=221.41.164.4 protocol=tcp sport=64787 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1660877139.617139663 M61_MX67C_Savannah l7_firewall src=74.92.116.170 dst=221.41.164.4 protocol=tcp sport=64787 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 64787
protocol: 6
streamName: meraki_l7_firewall
clientIP: 74.92.116.170
serverIP: 221.41.164.4 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1660877139.617139663 M61_MX67C_Savannah l7_firewall src=229.243.55.172 dst=195.3.101.238 protocol=tcp sport=64787 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1660877139.617139663 M61_MX67C_Savannah l7_firewall src=229.243.55.172 dst=195.3.101.238 protocol=tcp sport=64787 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 64787,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "229.243.55.172",
"serverIP": "195.3.101.238"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1660877139.617139663 M61_MX67C_Savannah l7_firewall src=229.243.55.172 dst=195.3.101.238 protocol=tcp sport=64787 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1660877139.617139663 M61_MX67C_Savannah l7_firewall src=229.243.55.172 dst=195.3.101.238 protocol=tcp sport=64787 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 64787
protocol: 6
streamName: meraki_l7_firewall
clientIP: 229.243.55.172
serverIP: 195.3.101.238 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1660877139.617139663 M61_MX67C_Savannah l7_firewall src=194.185.97.38 dst=66.217.150.54 protocol=tcp sport=64787 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1660877139.617139663 M61_MX67C_Savannah l7_firewall src=194.185.97.38 dst=66.217.150.54 protocol=tcp sport=64787 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 64787,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "194.185.97.38",
"serverIP": "66.217.150.54"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1660877139.617139663 M61_MX67C_Savannah l7_firewall src=194.185.97.38 dst=66.217.150.54 protocol=tcp sport=64787 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1660877139.617139663 M61_MX67C_Savannah l7_firewall src=194.185.97.38 dst=66.217.150.54 protocol=tcp sport=64787 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 64787
protocol: 6
streamName: meraki_l7_firewall
clientIP: 194.185.97.38
serverIP: 66.217.150.54 | Explain this syslog message |
<134>Original Address=75.146.93.165 1 1660877139.617139663 M61_MX67C_Savannah l7_firewall src=37.167.180.204 dst=222.226.30.17 protocol=tcp sport=64787 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=75.146.93.165 1 1660877139.617139663 M61_MX67C_Savannah l7_firewall src=37.167.180.204 dst=222.226.30.17 protocol=tcp sport=64787 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 64787,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "37.167.180.204",
"serverIP": "222.226.30.17"
} | Create a JSON artifact from the message |
<134>Original Address=75.146.93.165 1 1660877139.617139663 M61_MX67C_Savannah l7_firewall src=37.167.180.204 dst=222.226.30.17 protocol=tcp sport=64787 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=75.146.93.165 1 1660877139.617139663 M61_MX67C_Savannah l7_firewall src=37.167.180.204 dst=222.226.30.17 protocol=tcp sport=64787 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 64787
protocol: 6
streamName: meraki_l7_firewall
clientIP: 37.167.180.204
serverIP: 222.226.30.17 | Explain this syslog message |
<134>Original Address=96.87.229.81 1 1660871164.755687249 M23_MX67C_CRMarietta l7_firewall src=9.255.11.190 dst=70.24.14.192 protocol=tcp sport=55526 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.87.229.81 1 1660871164.755687249 M23_MX67C_CRMarietta l7_firewall src=9.255.11.190 dst=70.24.14.192 protocol=tcp sport=55526 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 55526,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "9.255.11.190",
"serverIP": "70.24.14.192"
} | Create a JSON artifact from the message |
<134>Original Address=96.87.229.81 1 1660871164.755687249 M23_MX67C_CRMarietta l7_firewall src=9.255.11.190 dst=70.24.14.192 protocol=tcp sport=55526 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.87.229.81 1 1660871164.755687249 M23_MX67C_CRMarietta l7_firewall src=9.255.11.190 dst=70.24.14.192 protocol=tcp sport=55526 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 55526
protocol: 6
streamName: meraki_l7_firewall
clientIP: 9.255.11.190
serverIP: 70.24.14.192 | Explain this syslog message |
<134>Original Address=96.87.229.81 1 1660871164.755687249 M23_MX67C_CRMarietta l7_firewall src=40.163.90.142 dst=218.235.78.39 protocol=tcp sport=55526 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.87.229.81 1 1660871164.755687249 M23_MX67C_CRMarietta l7_firewall src=40.163.90.142 dst=218.235.78.39 protocol=tcp sport=55526 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 55526,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "40.163.90.142",
"serverIP": "218.235.78.39"
} | Create a JSON artifact from the message |
<134>Original Address=96.87.229.81 1 1660871164.755687249 M23_MX67C_CRMarietta l7_firewall src=40.163.90.142 dst=218.235.78.39 protocol=tcp sport=55526 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.87.229.81 1 1660871164.755687249 M23_MX67C_CRMarietta l7_firewall src=40.163.90.142 dst=218.235.78.39 protocol=tcp sport=55526 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 55526
protocol: 6
streamName: meraki_l7_firewall
clientIP: 40.163.90.142
serverIP: 218.235.78.39 | Explain this syslog message |
<134>Original Address=96.87.229.81 1 1660871164.755687249 M23_MX67C_CRMarietta l7_firewall src=24.231.254.213 dst=167.51.96.5 protocol=tcp sport=55526 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.87.229.81 1 1660871164.755687249 M23_MX67C_CRMarietta l7_firewall src=24.231.254.213 dst=167.51.96.5 protocol=tcp sport=55526 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 55526,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "24.231.254.213",
"serverIP": "167.51.96.5"
} | Create a JSON artifact from the message |
<134>Original Address=96.87.229.81 1 1660871164.755687249 M23_MX67C_CRMarietta l7_firewall src=24.231.254.213 dst=167.51.96.5 protocol=tcp sport=55526 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.87.229.81 1 1660871164.755687249 M23_MX67C_CRMarietta l7_firewall src=24.231.254.213 dst=167.51.96.5 protocol=tcp sport=55526 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 55526
protocol: 6
streamName: meraki_l7_firewall
clientIP: 24.231.254.213
serverIP: 167.51.96.5 | Explain this syslog message |
<134>Original Address=96.87.229.81 1 1660871164.755687249 M23_MX67C_CRMarietta l7_firewall src=36.50.91.20 dst=94.37.99.38 protocol=tcp sport=55526 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.87.229.81 1 1660871164.755687249 M23_MX67C_CRMarietta l7_firewall src=36.50.91.20 dst=94.37.99.38 protocol=tcp sport=55526 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 55526,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "36.50.91.20",
"serverIP": "94.37.99.38"
} | Create a JSON artifact from the message |
<134>Original Address=96.87.229.81 1 1660871164.755687249 M23_MX67C_CRMarietta l7_firewall src=36.50.91.20 dst=94.37.99.38 protocol=tcp sport=55526 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.87.229.81 1 1660871164.755687249 M23_MX67C_CRMarietta l7_firewall src=36.50.91.20 dst=94.37.99.38 protocol=tcp sport=55526 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 55526
protocol: 6
streamName: meraki_l7_firewall
clientIP: 36.50.91.20
serverIP: 94.37.99.38 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1688025178.161024915 NORDC_MX400_1 l7_firewall src=126.154.254.68 dst=1.176.249.72 protocol=tcp sport=57173 dport=443 decision=blocked | {
"action": "block",
"clientport": 57173,
"message": "<134>Original Address=192.168.2.253 1 1688025178.161024915 NORDC_MX400_1 l7_firewall src=126.154.254.68 dst=1.176.249.72 protocol=tcp sport=57173 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "126.154.254.68",
"serverIP": "1.176.249.72"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1688025178.161024915 NORDC_MX400_1 l7_firewall src=126.154.254.68 dst=1.176.249.72 protocol=tcp sport=57173 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1688025178.161024915 NORDC_MX400_1 l7_firewall src=126.154.254.68 dst=1.176.249.72 protocol=tcp sport=57173 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 57173
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 126.154.254.68
serverIP: 1.176.249.72 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1688025178.161024915 NORDC_MX400_1 l7_firewall src=189.185.93.244 dst=238.184.158.76 protocol=tcp sport=57173 dport=443 decision=blocked | {
"action": "block",
"clientport": 57173,
"message": "<134>Original Address=192.168.2.253 1 1688025178.161024915 NORDC_MX400_1 l7_firewall src=189.185.93.244 dst=238.184.158.76 protocol=tcp sport=57173 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "189.185.93.244",
"serverIP": "238.184.158.76"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1688025178.161024915 NORDC_MX400_1 l7_firewall src=189.185.93.244 dst=238.184.158.76 protocol=tcp sport=57173 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1688025178.161024915 NORDC_MX400_1 l7_firewall src=189.185.93.244 dst=238.184.158.76 protocol=tcp sport=57173 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 57173
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 189.185.93.244
serverIP: 238.184.158.76 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1688025178.161024915 NORDC_MX400_1 l7_firewall src=172.137.31.78 dst=43.139.26.55 protocol=tcp sport=57173 dport=443 decision=blocked | {
"action": "block",
"clientport": 57173,
"message": "<134>Original Address=192.168.2.253 1 1688025178.161024915 NORDC_MX400_1 l7_firewall src=172.137.31.78 dst=43.139.26.55 protocol=tcp sport=57173 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "172.137.31.78",
"serverIP": "43.139.26.55"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1688025178.161024915 NORDC_MX400_1 l7_firewall src=172.137.31.78 dst=43.139.26.55 protocol=tcp sport=57173 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1688025178.161024915 NORDC_MX400_1 l7_firewall src=172.137.31.78 dst=43.139.26.55 protocol=tcp sport=57173 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 57173
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 172.137.31.78
serverIP: 43.139.26.55 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1688025178.161024915 NORDC_MX400_1 l7_firewall src=66.124.214.88 dst=57.129.245.216 protocol=tcp sport=57173 dport=443 decision=blocked | {
"action": "block",
"clientport": 57173,
"message": "<134>Original Address=192.168.2.253 1 1688025178.161024915 NORDC_MX400_1 l7_firewall src=66.124.214.88 dst=57.129.245.216 protocol=tcp sport=57173 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "66.124.214.88",
"serverIP": "57.129.245.216"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1688025178.161024915 NORDC_MX400_1 l7_firewall src=66.124.214.88 dst=57.129.245.216 protocol=tcp sport=57173 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1688025178.161024915 NORDC_MX400_1 l7_firewall src=66.124.214.88 dst=57.129.245.216 protocol=tcp sport=57173 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 57173
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 66.124.214.88
serverIP: 57.129.245.216 | Explain this syslog message |
<134>Original Address=24.54.110.146 1 1655068808.674508555 M68_MX67C_Statesboro l7_firewall src=24.66.197.238 dst=129.225.40.75 protocol=tcp sport=64336 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.54.110.146 1 1655068808.674508555 M68_MX67C_Statesboro l7_firewall src=24.66.197.238 dst=129.225.40.75 protocol=tcp sport=64336 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 64336,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "24.66.197.238",
"serverIP": "129.225.40.75"
} | Create a JSON artifact from the message |
<134>Original Address=24.54.110.146 1 1655068808.674508555 M68_MX67C_Statesboro l7_firewall src=24.66.197.238 dst=129.225.40.75 protocol=tcp sport=64336 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.54.110.146 1 1655068808.674508555 M68_MX67C_Statesboro l7_firewall src=24.66.197.238 dst=129.225.40.75 protocol=tcp sport=64336 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 64336
protocol: 6
streamName: meraki_l7_firewall
clientIP: 24.66.197.238
serverIP: 129.225.40.75 | Explain this syslog message |
<134>Original Address=24.54.110.146 1 1655068808.674508555 M68_MX67C_Statesboro l7_firewall src=250.236.252.197 dst=64.25.50.149 protocol=tcp sport=64336 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.54.110.146 1 1655068808.674508555 M68_MX67C_Statesboro l7_firewall src=250.236.252.197 dst=64.25.50.149 protocol=tcp sport=64336 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 64336,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "250.236.252.197",
"serverIP": "64.25.50.149"
} | Create a JSON artifact from the message |
<134>Original Address=24.54.110.146 1 1655068808.674508555 M68_MX67C_Statesboro l7_firewall src=250.236.252.197 dst=64.25.50.149 protocol=tcp sport=64336 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.54.110.146 1 1655068808.674508555 M68_MX67C_Statesboro l7_firewall src=250.236.252.197 dst=64.25.50.149 protocol=tcp sport=64336 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 64336
protocol: 6
streamName: meraki_l7_firewall
clientIP: 250.236.252.197
serverIP: 64.25.50.149 | Explain this syslog message |
<134>Original Address=24.54.110.146 1 1655068808.674508555 M68_MX67C_Statesboro l7_firewall src=127.248.220.249 dst=187.131.156.138 protocol=tcp sport=64336 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.54.110.146 1 1655068808.674508555 M68_MX67C_Statesboro l7_firewall src=127.248.220.249 dst=187.131.156.138 protocol=tcp sport=64336 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 64336,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "127.248.220.249",
"serverIP": "187.131.156.138"
} | Create a JSON artifact from the message |
<134>Original Address=24.54.110.146 1 1655068808.674508555 M68_MX67C_Statesboro l7_firewall src=127.248.220.249 dst=187.131.156.138 protocol=tcp sport=64336 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.54.110.146 1 1655068808.674508555 M68_MX67C_Statesboro l7_firewall src=127.248.220.249 dst=187.131.156.138 protocol=tcp sport=64336 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 64336
protocol: 6
streamName: meraki_l7_firewall
clientIP: 127.248.220.249
serverIP: 187.131.156.138 | Explain this syslog message |
<134>Original Address=24.54.110.146 1 1655068808.674508555 M68_MX67C_Statesboro l7_firewall src=89.95.133.29 dst=174.157.145.108 protocol=tcp sport=64336 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.54.110.146 1 1655068808.674508555 M68_MX67C_Statesboro l7_firewall src=89.95.133.29 dst=174.157.145.108 protocol=tcp sport=64336 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 64336,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "89.95.133.29",
"serverIP": "174.157.145.108"
} | Create a JSON artifact from the message |
<134>Original Address=24.54.110.146 1 1655068808.674508555 M68_MX67C_Statesboro l7_firewall src=89.95.133.29 dst=174.157.145.108 protocol=tcp sport=64336 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.54.110.146 1 1655068808.674508555 M68_MX67C_Statesboro l7_firewall src=89.95.133.29 dst=174.157.145.108 protocol=tcp sport=64336 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 64336
protocol: 6
streamName: meraki_l7_firewall
clientIP: 89.95.133.29
serverIP: 174.157.145.108 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1669877528.213286951 NORDC_MX400_1 l7_firewall src=65.62.195.160 dst=245.62.246.119 protocol=tcp sport=80 dport=26149 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1669877528.213286951 NORDC_MX400_1 l7_firewall src=65.62.195.160 dst=245.62.246.119 protocol=tcp sport=80 dport=26149 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 26149,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "245.62.246.119",
"serverIP": "65.62.195.160"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1669877528.213286951 NORDC_MX400_1 l7_firewall src=65.62.195.160 dst=245.62.246.119 protocol=tcp sport=80 dport=26149 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1669877528.213286951 NORDC_MX400_1 l7_firewall src=65.62.195.160 dst=245.62.246.119 protocol=tcp sport=80 dport=26149 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 26149
protocol: 6
streamName: meraki_l7_firewall
clientIP: 245.62.246.119
serverIP: 65.62.195.160 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1669877528.213286951 NORDC_MX400_1 l7_firewall src=11.141.89.177 dst=254.126.192.3 protocol=tcp sport=80 dport=26149 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1669877528.213286951 NORDC_MX400_1 l7_firewall src=11.141.89.177 dst=254.126.192.3 protocol=tcp sport=80 dport=26149 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 26149,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "254.126.192.3",
"serverIP": "11.141.89.177"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1669877528.213286951 NORDC_MX400_1 l7_firewall src=11.141.89.177 dst=254.126.192.3 protocol=tcp sport=80 dport=26149 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1669877528.213286951 NORDC_MX400_1 l7_firewall src=11.141.89.177 dst=254.126.192.3 protocol=tcp sport=80 dport=26149 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 26149
protocol: 6
streamName: meraki_l7_firewall
clientIP: 254.126.192.3
serverIP: 11.141.89.177 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1669877528.213286951 NORDC_MX400_1 l7_firewall src=248.62.8.117 dst=119.73.74.160 protocol=tcp sport=80 dport=26149 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1669877528.213286951 NORDC_MX400_1 l7_firewall src=248.62.8.117 dst=119.73.74.160 protocol=tcp sport=80 dport=26149 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 26149,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "119.73.74.160",
"serverIP": "248.62.8.117"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1669877528.213286951 NORDC_MX400_1 l7_firewall src=248.62.8.117 dst=119.73.74.160 protocol=tcp sport=80 dport=26149 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1669877528.213286951 NORDC_MX400_1 l7_firewall src=248.62.8.117 dst=119.73.74.160 protocol=tcp sport=80 dport=26149 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 26149
protocol: 6
streamName: meraki_l7_firewall
clientIP: 119.73.74.160
serverIP: 248.62.8.117 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1669877528.213286951 NORDC_MX400_1 l7_firewall src=67.245.169.249 dst=26.116.163.96 protocol=tcp sport=80 dport=26149 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1669877528.213286951 NORDC_MX400_1 l7_firewall src=67.245.169.249 dst=26.116.163.96 protocol=tcp sport=80 dport=26149 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 26149,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "26.116.163.96",
"serverIP": "67.245.169.249"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1669877528.213286951 NORDC_MX400_1 l7_firewall src=67.245.169.249 dst=26.116.163.96 protocol=tcp sport=80 dport=26149 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1669877528.213286951 NORDC_MX400_1 l7_firewall src=67.245.169.249 dst=26.116.163.96 protocol=tcp sport=80 dport=26149 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 26149
protocol: 6
streamName: meraki_l7_firewall
clientIP: 26.116.163.96
serverIP: 67.245.169.249 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1669877547.430164676 NORDC_MX400_1 l7_firewall src=106.98.113.84 dst=205.255.181.130 protocol=tcp sport=80 dport=32551 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1669877547.430164676 NORDC_MX400_1 l7_firewall src=106.98.113.84 dst=205.255.181.130 protocol=tcp sport=80 dport=32551 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 32551,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "205.255.181.130",
"serverIP": "106.98.113.84"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1669877547.430164676 NORDC_MX400_1 l7_firewall src=106.98.113.84 dst=205.255.181.130 protocol=tcp sport=80 dport=32551 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1669877547.430164676 NORDC_MX400_1 l7_firewall src=106.98.113.84 dst=205.255.181.130 protocol=tcp sport=80 dport=32551 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 32551
protocol: 6
streamName: meraki_l7_firewall
clientIP: 205.255.181.130
serverIP: 106.98.113.84 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1669877547.430164676 NORDC_MX400_1 l7_firewall src=133.187.1.113 dst=187.228.194.142 protocol=tcp sport=80 dport=32551 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1669877547.430164676 NORDC_MX400_1 l7_firewall src=133.187.1.113 dst=187.228.194.142 protocol=tcp sport=80 dport=32551 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 32551,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "187.228.194.142",
"serverIP": "133.187.1.113"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1669877547.430164676 NORDC_MX400_1 l7_firewall src=133.187.1.113 dst=187.228.194.142 protocol=tcp sport=80 dport=32551 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.