input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<134>Original Address=192.168.2.253 1 1690866505.173249782 NORDC_MX400_1 l7_firewall src=14.207.99.79 dst=38.105.14.182 protocol=tcp sport=62160 dport=443 decision=blocked
{ "action": "block", "clientport": 62160, "message": "<134>Original Address=192.168.2.253 1 1690866505.173249782 NORDC_MX400_1 l7_firewall src=14.207.99.79 dst=38.105.14.182 protocol=tcp sport=62160 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "14.207.99.79", "serverIP": "38.105.14.182" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1690866505.173249782 NORDC_MX400_1 l7_firewall src=14.207.99.79 dst=38.105.14.182 protocol=tcp sport=62160 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1690866505.173249782 NORDC_MX400_1 l7_firewall src=14.207.99.79 dst=38.105.14.182 protocol=tcp sport=62160 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 62160 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 14.207.99.79 serverIP: 38.105.14.182
Explain this syslog message
<134>Original Address=192.168.2.253 1 1690866505.173249782 NORDC_MX400_1 l7_firewall src=135.43.207.91 dst=33.230.46.158 protocol=tcp sport=62160 dport=443 decision=blocked
{ "action": "block", "clientport": 62160, "message": "<134>Original Address=192.168.2.253 1 1690866505.173249782 NORDC_MX400_1 l7_firewall src=135.43.207.91 dst=33.230.46.158 protocol=tcp sport=62160 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "135.43.207.91", "serverIP": "33.230.46.158" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1690866505.173249782 NORDC_MX400_1 l7_firewall src=135.43.207.91 dst=33.230.46.158 protocol=tcp sport=62160 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1690866505.173249782 NORDC_MX400_1 l7_firewall src=135.43.207.91 dst=33.230.46.158 protocol=tcp sport=62160 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 62160 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 135.43.207.91 serverIP: 33.230.46.158
Explain this syslog message
<134>Original Address=192.168.2.253 1 1690866505.173249782 NORDC_MX400_1 l7_firewall src=191.36.248.166 dst=209.255.151.64 protocol=tcp sport=62160 dport=443 decision=blocked
{ "action": "block", "clientport": 62160, "message": "<134>Original Address=192.168.2.253 1 1690866505.173249782 NORDC_MX400_1 l7_firewall src=191.36.248.166 dst=209.255.151.64 protocol=tcp sport=62160 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "191.36.248.166", "serverIP": "209.255.151.64" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1690866505.173249782 NORDC_MX400_1 l7_firewall src=191.36.248.166 dst=209.255.151.64 protocol=tcp sport=62160 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1690866505.173249782 NORDC_MX400_1 l7_firewall src=191.36.248.166 dst=209.255.151.64 protocol=tcp sport=62160 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 62160 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 191.36.248.166 serverIP: 209.255.151.64
Explain this syslog message
<134>Original Address=10.11.22.1 1 1657569805.157088712 M22_MX67C_Marietta l7_firewall src=41.43.31.76 dst=116.70.194.248 protocol=tcp sport=50231 dport=80 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 80, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=10.11.22.1 1 1657569805.157088712 M22_MX67C_Marietta l7_firewall src=41.43.31.76 dst=116.70.194.248 protocol=tcp sport=50231 dport=80 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 50231, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "41.43.31.76", "serverIP": "116.70.194.248" }
Create a JSON artifact from the message
<134>Original Address=10.11.22.1 1 1657569805.157088712 M22_MX67C_Marietta l7_firewall src=41.43.31.76 dst=116.70.194.248 protocol=tcp sport=50231 dport=80 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=10.11.22.1 1 1657569805.157088712 M22_MX67C_Marietta l7_firewall src=41.43.31.76 dst=116.70.194.248 protocol=tcp sport=50231 dport=80 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 80 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 50231 protocol: 6 streamName: meraki_l7_firewall clientIP: 41.43.31.76 serverIP: 116.70.194.248
Explain this syslog message
<134>Original Address=10.11.22.1 1 1657569805.157088712 M22_MX67C_Marietta l7_firewall src=15.252.233.155 dst=227.7.7.18 protocol=tcp sport=50231 dport=80 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 80, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=10.11.22.1 1 1657569805.157088712 M22_MX67C_Marietta l7_firewall src=15.252.233.155 dst=227.7.7.18 protocol=tcp sport=50231 dport=80 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 50231, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "15.252.233.155", "serverIP": "227.7.7.18" }
Create a JSON artifact from the message
<134>Original Address=10.11.22.1 1 1657569805.157088712 M22_MX67C_Marietta l7_firewall src=15.252.233.155 dst=227.7.7.18 protocol=tcp sport=50231 dport=80 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=10.11.22.1 1 1657569805.157088712 M22_MX67C_Marietta l7_firewall src=15.252.233.155 dst=227.7.7.18 protocol=tcp sport=50231 dport=80 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 80 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 50231 protocol: 6 streamName: meraki_l7_firewall clientIP: 15.252.233.155 serverIP: 227.7.7.18
Explain this syslog message
<134>Original Address=10.11.22.1 1 1657569805.157088712 M22_MX67C_Marietta l7_firewall src=234.180.234.136 dst=145.226.60.97 protocol=tcp sport=50231 dport=80 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 80, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=10.11.22.1 1 1657569805.157088712 M22_MX67C_Marietta l7_firewall src=234.180.234.136 dst=145.226.60.97 protocol=tcp sport=50231 dport=80 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 50231, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "234.180.234.136", "serverIP": "145.226.60.97" }
Create a JSON artifact from the message
<134>Original Address=10.11.22.1 1 1657569805.157088712 M22_MX67C_Marietta l7_firewall src=234.180.234.136 dst=145.226.60.97 protocol=tcp sport=50231 dport=80 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=10.11.22.1 1 1657569805.157088712 M22_MX67C_Marietta l7_firewall src=234.180.234.136 dst=145.226.60.97 protocol=tcp sport=50231 dport=80 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 80 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 50231 protocol: 6 streamName: meraki_l7_firewall clientIP: 234.180.234.136 serverIP: 145.226.60.97
Explain this syslog message
<134>Original Address=10.11.22.1 1 1657569805.157088712 M22_MX67C_Marietta l7_firewall src=92.176.168.74 dst=42.32.66.66 protocol=tcp sport=50231 dport=80 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 80, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=10.11.22.1 1 1657569805.157088712 M22_MX67C_Marietta l7_firewall src=92.176.168.74 dst=42.32.66.66 protocol=tcp sport=50231 dport=80 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 50231, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "92.176.168.74", "serverIP": "42.32.66.66" }
Create a JSON artifact from the message
<134>Original Address=10.11.22.1 1 1657569805.157088712 M22_MX67C_Marietta l7_firewall src=92.176.168.74 dst=42.32.66.66 protocol=tcp sport=50231 dport=80 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=10.11.22.1 1 1657569805.157088712 M22_MX67C_Marietta l7_firewall src=92.176.168.74 dst=42.32.66.66 protocol=tcp sport=50231 dport=80 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 80 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 50231 protocol: 6 streamName: meraki_l7_firewall clientIP: 92.176.168.74 serverIP: 42.32.66.66
Explain this syslog message
<134>Original Address=192.168.2.253 1 1657569806.806819861 NORDC_MX400_1 l7_firewall src=25.90.89.222 dst=210.5.147.199 protocol=tcp sport=49662 dport=80 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 80, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1657569806.806819861 NORDC_MX400_1 l7_firewall src=25.90.89.222 dst=210.5.147.199 protocol=tcp sport=49662 dport=80 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 49662, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "25.90.89.222", "serverIP": "210.5.147.199" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1657569806.806819861 NORDC_MX400_1 l7_firewall src=25.90.89.222 dst=210.5.147.199 protocol=tcp sport=49662 dport=80 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1657569806.806819861 NORDC_MX400_1 l7_firewall src=25.90.89.222 dst=210.5.147.199 protocol=tcp sport=49662 dport=80 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 80 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 49662 protocol: 6 streamName: meraki_l7_firewall clientIP: 25.90.89.222 serverIP: 210.5.147.199
Explain this syslog message
<134>Original Address=192.168.2.253 1 1657569806.806819861 NORDC_MX400_1 l7_firewall src=230.203.141.57 dst=143.156.231.107 protocol=tcp sport=49662 dport=80 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 80, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1657569806.806819861 NORDC_MX400_1 l7_firewall src=230.203.141.57 dst=143.156.231.107 protocol=tcp sport=49662 dport=80 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 49662, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "230.203.141.57", "serverIP": "143.156.231.107" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1657569806.806819861 NORDC_MX400_1 l7_firewall src=230.203.141.57 dst=143.156.231.107 protocol=tcp sport=49662 dport=80 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1657569806.806819861 NORDC_MX400_1 l7_firewall src=230.203.141.57 dst=143.156.231.107 protocol=tcp sport=49662 dport=80 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 80 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 49662 protocol: 6 streamName: meraki_l7_firewall clientIP: 230.203.141.57 serverIP: 143.156.231.107
Explain this syslog message
<134>Original Address=192.168.2.253 1 1657569806.806819861 NORDC_MX400_1 l7_firewall src=11.214.192.227 dst=176.68.140.105 protocol=tcp sport=49662 dport=80 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 80, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1657569806.806819861 NORDC_MX400_1 l7_firewall src=11.214.192.227 dst=176.68.140.105 protocol=tcp sport=49662 dport=80 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 49662, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "11.214.192.227", "serverIP": "176.68.140.105" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1657569806.806819861 NORDC_MX400_1 l7_firewall src=11.214.192.227 dst=176.68.140.105 protocol=tcp sport=49662 dport=80 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1657569806.806819861 NORDC_MX400_1 l7_firewall src=11.214.192.227 dst=176.68.140.105 protocol=tcp sport=49662 dport=80 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 80 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 49662 protocol: 6 streamName: meraki_l7_firewall clientIP: 11.214.192.227 serverIP: 176.68.140.105
Explain this syslog message
<134>Original Address=192.168.2.253 1 1657569806.806819861 NORDC_MX400_1 l7_firewall src=101.168.9.147 dst=107.165.18.166 protocol=tcp sport=49662 dport=80 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 80, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1657569806.806819861 NORDC_MX400_1 l7_firewall src=101.168.9.147 dst=107.165.18.166 protocol=tcp sport=49662 dport=80 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 49662, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "101.168.9.147", "serverIP": "107.165.18.166" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1657569806.806819861 NORDC_MX400_1 l7_firewall src=101.168.9.147 dst=107.165.18.166 protocol=tcp sport=49662 dport=80 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1657569806.806819861 NORDC_MX400_1 l7_firewall src=101.168.9.147 dst=107.165.18.166 protocol=tcp sport=49662 dport=80 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 80 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 49662 protocol: 6 streamName: meraki_l7_firewall clientIP: 101.168.9.147 serverIP: 107.165.18.166
Explain this syslog message
<134>Original Address=192.168.2.253 1 1659539387.750201812 NORDC_MX400_1 l7_firewall src=81.171.116.122 dst=20.56.125.43 protocol=tcp sport=56204 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1659539387.750201812 NORDC_MX400_1 l7_firewall src=81.171.116.122 dst=20.56.125.43 protocol=tcp sport=56204 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 56204, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "81.171.116.122", "serverIP": "20.56.125.43" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1659539387.750201812 NORDC_MX400_1 l7_firewall src=81.171.116.122 dst=20.56.125.43 protocol=tcp sport=56204 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1659539387.750201812 NORDC_MX400_1 l7_firewall src=81.171.116.122 dst=20.56.125.43 protocol=tcp sport=56204 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 56204 protocol: 6 streamName: meraki_l7_firewall clientIP: 81.171.116.122 serverIP: 20.56.125.43
Explain this syslog message
<134>Original Address=192.168.2.253 1 1659539387.750201812 NORDC_MX400_1 l7_firewall src=113.215.15.93 dst=113.84.136.33 protocol=tcp sport=56204 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1659539387.750201812 NORDC_MX400_1 l7_firewall src=113.215.15.93 dst=113.84.136.33 protocol=tcp sport=56204 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 56204, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "113.215.15.93", "serverIP": "113.84.136.33" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1659539387.750201812 NORDC_MX400_1 l7_firewall src=113.215.15.93 dst=113.84.136.33 protocol=tcp sport=56204 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1659539387.750201812 NORDC_MX400_1 l7_firewall src=113.215.15.93 dst=113.84.136.33 protocol=tcp sport=56204 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 56204 protocol: 6 streamName: meraki_l7_firewall clientIP: 113.215.15.93 serverIP: 113.84.136.33
Explain this syslog message
<134>Original Address=192.168.2.253 1 1659539387.750201812 NORDC_MX400_1 l7_firewall src=22.76.55.107 dst=57.243.13.67 protocol=tcp sport=56204 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1659539387.750201812 NORDC_MX400_1 l7_firewall src=22.76.55.107 dst=57.243.13.67 protocol=tcp sport=56204 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 56204, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "22.76.55.107", "serverIP": "57.243.13.67" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1659539387.750201812 NORDC_MX400_1 l7_firewall src=22.76.55.107 dst=57.243.13.67 protocol=tcp sport=56204 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1659539387.750201812 NORDC_MX400_1 l7_firewall src=22.76.55.107 dst=57.243.13.67 protocol=tcp sport=56204 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 56204 protocol: 6 streamName: meraki_l7_firewall clientIP: 22.76.55.107 serverIP: 57.243.13.67
Explain this syslog message
<134>Original Address=192.168.2.253 1 1659539387.750201812 NORDC_MX400_1 l7_firewall src=120.31.161.178 dst=202.171.216.78 protocol=tcp sport=56204 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1659539387.750201812 NORDC_MX400_1 l7_firewall src=120.31.161.178 dst=202.171.216.78 protocol=tcp sport=56204 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 56204, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "120.31.161.178", "serverIP": "202.171.216.78" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1659539387.750201812 NORDC_MX400_1 l7_firewall src=120.31.161.178 dst=202.171.216.78 protocol=tcp sport=56204 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1659539387.750201812 NORDC_MX400_1 l7_firewall src=120.31.161.178 dst=202.171.216.78 protocol=tcp sport=56204 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 56204 protocol: 6 streamName: meraki_l7_firewall clientIP: 120.31.161.178 serverIP: 202.171.216.78
Explain this syslog message
<134>Original Address=192.168.2.253 1 1659539656.741046995 NORDC_MX400_1 l7_firewall src=236.53.106.124 dst=87.184.209.117 protocol=tcp sport=59071 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1659539656.741046995 NORDC_MX400_1 l7_firewall src=236.53.106.124 dst=87.184.209.117 protocol=tcp sport=59071 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 59071, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "236.53.106.124", "serverIP": "87.184.209.117" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1659539656.741046995 NORDC_MX400_1 l7_firewall src=236.53.106.124 dst=87.184.209.117 protocol=tcp sport=59071 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1659539656.741046995 NORDC_MX400_1 l7_firewall src=236.53.106.124 dst=87.184.209.117 protocol=tcp sport=59071 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 59071 protocol: 6 streamName: meraki_l7_firewall clientIP: 236.53.106.124 serverIP: 87.184.209.117
Explain this syslog message
<134>Original Address=192.168.2.253 1 1659539656.741046995 NORDC_MX400_1 l7_firewall src=69.68.191.152 dst=243.189.136.135 protocol=tcp sport=59071 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1659539656.741046995 NORDC_MX400_1 l7_firewall src=69.68.191.152 dst=243.189.136.135 protocol=tcp sport=59071 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 59071, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "69.68.191.152", "serverIP": "243.189.136.135" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1659539656.741046995 NORDC_MX400_1 l7_firewall src=69.68.191.152 dst=243.189.136.135 protocol=tcp sport=59071 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1659539656.741046995 NORDC_MX400_1 l7_firewall src=69.68.191.152 dst=243.189.136.135 protocol=tcp sport=59071 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 59071 protocol: 6 streamName: meraki_l7_firewall clientIP: 69.68.191.152 serverIP: 243.189.136.135
Explain this syslog message
<134>Original Address=192.168.2.253 1 1659539656.741046995 NORDC_MX400_1 l7_firewall src=144.232.88.231 dst=199.144.56.111 protocol=tcp sport=59071 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1659539656.741046995 NORDC_MX400_1 l7_firewall src=144.232.88.231 dst=199.144.56.111 protocol=tcp sport=59071 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 59071, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "144.232.88.231", "serverIP": "199.144.56.111" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1659539656.741046995 NORDC_MX400_1 l7_firewall src=144.232.88.231 dst=199.144.56.111 protocol=tcp sport=59071 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1659539656.741046995 NORDC_MX400_1 l7_firewall src=144.232.88.231 dst=199.144.56.111 protocol=tcp sport=59071 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 59071 protocol: 6 streamName: meraki_l7_firewall clientIP: 144.232.88.231 serverIP: 199.144.56.111
Explain this syslog message
<134>Original Address=192.168.2.253 1 1659539656.741046995 NORDC_MX400_1 l7_firewall src=212.51.27.200 dst=121.212.38.43 protocol=tcp sport=59071 dport=443 decision=blocked
{ "program": "l7_firewall", "senderhost": "192.168.2.250", "serverport": 443, "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "productids": [ 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1659539656.741046995 NORDC_MX400_1 l7_firewall src=212.51.27.200 dst=121.212.38.43 protocol=tcp sport=59071 dport=443 decision=blocked", "action": "block", "sensitivity": "normal", "messagetype": "anomalous_behavior", "clientport": 59071, "protocol": 6, "streamName": "meraki_l7_firewall", "clientIP": "212.51.27.200", "serverIP": "121.212.38.43" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1659539656.741046995 NORDC_MX400_1 l7_firewall src=212.51.27.200 dst=121.212.38.43 protocol=tcp sport=59071 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1659539656.741046995 NORDC_MX400_1 l7_firewall src=212.51.27.200 dst=121.212.38.43 protocol=tcp sport=59071 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: program: l7_firewall senderhost: 192.168.2.250 serverport: 443 tags: ['meraki_l7_firewall', 'anomalous_behavior'] productids: [0] sourceinfo: unknown action: block sensitivity: normal messagetype: anomalous_behavior clientport: 59071 protocol: 6 streamName: meraki_l7_firewall clientIP: 212.51.27.200 serverIP: 121.212.38.43
Explain this syslog message
<134>Original Address=192.168.2.253 1 1688212397.620203483 NORDC_MX400_1 l7_firewall src=146.161.185.35 dst=195.91.123.206 protocol=udp sport=58676 dport=45823 decision=blocked
{ "action": "block", "clientport": 58676, "message": "<134>Original Address=192.168.2.253 1 1688212397.620203483 NORDC_MX400_1 l7_firewall src=146.161.185.35 dst=195.91.123.206 protocol=udp sport=58676 dport=45823 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 17, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 45823, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "146.161.185.35", "serverIP": "195.91.123.206" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1688212397.620203483 NORDC_MX400_1 l7_firewall src=146.161.185.35 dst=195.91.123.206 protocol=udp sport=58676 dport=45823 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1688212397.620203483 NORDC_MX400_1 l7_firewall src=146.161.185.35 dst=195.91.123.206 protocol=udp sport=58676 dport=45823 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 58676 messagetype: anomalous_behavior program: l7_firewall protocol: 17 senderhost: 192.168.2.250 sensitivity: normal serverport: 45823 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 146.161.185.35 serverIP: 195.91.123.206
Explain this syslog message
<134>Original Address=192.168.2.253 1 1688212397.620203483 NORDC_MX400_1 l7_firewall src=127.65.129.176 dst=220.142.52.124 protocol=udp sport=58676 dport=45823 decision=blocked
{ "action": "block", "clientport": 58676, "message": "<134>Original Address=192.168.2.253 1 1688212397.620203483 NORDC_MX400_1 l7_firewall src=127.65.129.176 dst=220.142.52.124 protocol=udp sport=58676 dport=45823 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 17, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 45823, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "127.65.129.176", "serverIP": "220.142.52.124" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1688212397.620203483 NORDC_MX400_1 l7_firewall src=127.65.129.176 dst=220.142.52.124 protocol=udp sport=58676 dport=45823 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1688212397.620203483 NORDC_MX400_1 l7_firewall src=127.65.129.176 dst=220.142.52.124 protocol=udp sport=58676 dport=45823 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 58676 messagetype: anomalous_behavior program: l7_firewall protocol: 17 senderhost: 192.168.2.250 sensitivity: normal serverport: 45823 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 127.65.129.176 serverIP: 220.142.52.124
Explain this syslog message
<134>Original Address=192.168.2.253 1 1688212397.620203483 NORDC_MX400_1 l7_firewall src=245.78.66.157 dst=63.107.251.131 protocol=udp sport=58676 dport=45823 decision=blocked
{ "action": "block", "clientport": 58676, "message": "<134>Original Address=192.168.2.253 1 1688212397.620203483 NORDC_MX400_1 l7_firewall src=245.78.66.157 dst=63.107.251.131 protocol=udp sport=58676 dport=45823 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 17, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 45823, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "245.78.66.157", "serverIP": "63.107.251.131" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1688212397.620203483 NORDC_MX400_1 l7_firewall src=245.78.66.157 dst=63.107.251.131 protocol=udp sport=58676 dport=45823 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1688212397.620203483 NORDC_MX400_1 l7_firewall src=245.78.66.157 dst=63.107.251.131 protocol=udp sport=58676 dport=45823 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 58676 messagetype: anomalous_behavior program: l7_firewall protocol: 17 senderhost: 192.168.2.250 sensitivity: normal serverport: 45823 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 245.78.66.157 serverIP: 63.107.251.131
Explain this syslog message
<134>Original Address=192.168.2.253 1 1688212397.620203483 NORDC_MX400_1 l7_firewall src=250.208.181.49 dst=181.50.249.23 protocol=udp sport=58676 dport=45823 decision=blocked
{ "action": "block", "clientport": 58676, "message": "<134>Original Address=192.168.2.253 1 1688212397.620203483 NORDC_MX400_1 l7_firewall src=250.208.181.49 dst=181.50.249.23 protocol=udp sport=58676 dport=45823 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 17, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 45823, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "250.208.181.49", "serverIP": "181.50.249.23" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1688212397.620203483 NORDC_MX400_1 l7_firewall src=250.208.181.49 dst=181.50.249.23 protocol=udp sport=58676 dport=45823 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1688212397.620203483 NORDC_MX400_1 l7_firewall src=250.208.181.49 dst=181.50.249.23 protocol=udp sport=58676 dport=45823 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 58676 messagetype: anomalous_behavior program: l7_firewall protocol: 17 senderhost: 192.168.2.250 sensitivity: normal serverport: 45823 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 250.208.181.49 serverIP: 181.50.249.23
Explain this syslog message
<134>Original Address=192.168.2.253 1 1691050704.178176005 NORDC_MX400_1 l7_firewall src=183.70.5.150 dst=25.118.245.114 protocol=tcp sport=443 dport=53762 decision=blocked
{ "action": "block", "clientport": 53762, "message": "<134>Original Address=192.168.2.253 1 1691050704.178176005 NORDC_MX400_1 l7_firewall src=183.70.5.150 dst=25.118.245.114 protocol=tcp sport=443 dport=53762 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "25.118.245.114", "serverIP": "183.70.5.150" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1691050704.178176005 NORDC_MX400_1 l7_firewall src=183.70.5.150 dst=25.118.245.114 protocol=tcp sport=443 dport=53762 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1691050704.178176005 NORDC_MX400_1 l7_firewall src=183.70.5.150 dst=25.118.245.114 protocol=tcp sport=443 dport=53762 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 53762 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 25.118.245.114 serverIP: 183.70.5.150
Explain this syslog message
<134>Original Address=192.168.2.253 1 1691050704.178176005 NORDC_MX400_1 l7_firewall src=80.43.98.150 dst=51.202.176.220 protocol=tcp sport=443 dport=53762 decision=blocked
{ "action": "block", "clientport": 53762, "message": "<134>Original Address=192.168.2.253 1 1691050704.178176005 NORDC_MX400_1 l7_firewall src=80.43.98.150 dst=51.202.176.220 protocol=tcp sport=443 dport=53762 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "51.202.176.220", "serverIP": "80.43.98.150" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1691050704.178176005 NORDC_MX400_1 l7_firewall src=80.43.98.150 dst=51.202.176.220 protocol=tcp sport=443 dport=53762 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1691050704.178176005 NORDC_MX400_1 l7_firewall src=80.43.98.150 dst=51.202.176.220 protocol=tcp sport=443 dport=53762 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 53762 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 51.202.176.220 serverIP: 80.43.98.150
Explain this syslog message
<134>Original Address=192.168.2.253 1 1691050704.178176005 NORDC_MX400_1 l7_firewall src=5.195.197.200 dst=132.231.176.99 protocol=tcp sport=443 dport=53762 decision=blocked
{ "action": "block", "clientport": 53762, "message": "<134>Original Address=192.168.2.253 1 1691050704.178176005 NORDC_MX400_1 l7_firewall src=5.195.197.200 dst=132.231.176.99 protocol=tcp sport=443 dport=53762 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "132.231.176.99", "serverIP": "5.195.197.200" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1691050704.178176005 NORDC_MX400_1 l7_firewall src=5.195.197.200 dst=132.231.176.99 protocol=tcp sport=443 dport=53762 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1691050704.178176005 NORDC_MX400_1 l7_firewall src=5.195.197.200 dst=132.231.176.99 protocol=tcp sport=443 dport=53762 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 53762 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 132.231.176.99 serverIP: 5.195.197.200
Explain this syslog message
<134>Original Address=192.168.2.253 1 1691050704.178176005 NORDC_MX400_1 l7_firewall src=29.215.99.68 dst=136.180.145.177 protocol=tcp sport=443 dport=53762 decision=blocked
{ "action": "block", "clientport": 53762, "message": "<134>Original Address=192.168.2.253 1 1691050704.178176005 NORDC_MX400_1 l7_firewall src=29.215.99.68 dst=136.180.145.177 protocol=tcp sport=443 dport=53762 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "136.180.145.177", "serverIP": "29.215.99.68" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1691050704.178176005 NORDC_MX400_1 l7_firewall src=29.215.99.68 dst=136.180.145.177 protocol=tcp sport=443 dport=53762 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1691050704.178176005 NORDC_MX400_1 l7_firewall src=29.215.99.68 dst=136.180.145.177 protocol=tcp sport=443 dport=53762 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 53762 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 136.180.145.177 serverIP: 29.215.99.68
Explain this syslog message
<134>Original Address=192.168.2.253 1 1691046552.421628048 NORDC_MX400_1 l7_firewall src=221.123.220.109 dst=191.186.15.57 protocol=tcp sport=443 dport=58836 decision=blocked
{ "action": "block", "clientport": 58836, "message": "<134>Original Address=192.168.2.253 1 1691046552.421628048 NORDC_MX400_1 l7_firewall src=221.123.220.109 dst=191.186.15.57 protocol=tcp sport=443 dport=58836 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "191.186.15.57", "serverIP": "221.123.220.109" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1691046552.421628048 NORDC_MX400_1 l7_firewall src=221.123.220.109 dst=191.186.15.57 protocol=tcp sport=443 dport=58836 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1691046552.421628048 NORDC_MX400_1 l7_firewall src=221.123.220.109 dst=191.186.15.57 protocol=tcp sport=443 dport=58836 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 58836 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 191.186.15.57 serverIP: 221.123.220.109
Explain this syslog message
<134>Original Address=192.168.2.253 1 1691046552.421628048 NORDC_MX400_1 l7_firewall src=175.139.24.39 dst=86.0.69.204 protocol=tcp sport=443 dport=58836 decision=blocked
{ "action": "block", "clientport": 58836, "message": "<134>Original Address=192.168.2.253 1 1691046552.421628048 NORDC_MX400_1 l7_firewall src=175.139.24.39 dst=86.0.69.204 protocol=tcp sport=443 dport=58836 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "86.0.69.204", "serverIP": "175.139.24.39" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1691046552.421628048 NORDC_MX400_1 l7_firewall src=175.139.24.39 dst=86.0.69.204 protocol=tcp sport=443 dport=58836 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1691046552.421628048 NORDC_MX400_1 l7_firewall src=175.139.24.39 dst=86.0.69.204 protocol=tcp sport=443 dport=58836 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 58836 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 86.0.69.204 serverIP: 175.139.24.39
Explain this syslog message
<134>Original Address=192.168.2.253 1 1691046552.421628048 NORDC_MX400_1 l7_firewall src=114.206.191.47 dst=28.117.121.148 protocol=tcp sport=443 dport=58836 decision=blocked
{ "action": "block", "clientport": 58836, "message": "<134>Original Address=192.168.2.253 1 1691046552.421628048 NORDC_MX400_1 l7_firewall src=114.206.191.47 dst=28.117.121.148 protocol=tcp sport=443 dport=58836 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "28.117.121.148", "serverIP": "114.206.191.47" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1691046552.421628048 NORDC_MX400_1 l7_firewall src=114.206.191.47 dst=28.117.121.148 protocol=tcp sport=443 dport=58836 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1691046552.421628048 NORDC_MX400_1 l7_firewall src=114.206.191.47 dst=28.117.121.148 protocol=tcp sport=443 dport=58836 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 58836 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 28.117.121.148 serverIP: 114.206.191.47
Explain this syslog message
<134>Original Address=192.168.2.253 1 1691046552.421628048 NORDC_MX400_1 l7_firewall src=19.21.0.225 dst=168.73.30.75 protocol=tcp sport=443 dport=58836 decision=blocked
{ "action": "block", "clientport": 58836, "message": "<134>Original Address=192.168.2.253 1 1691046552.421628048 NORDC_MX400_1 l7_firewall src=19.21.0.225 dst=168.73.30.75 protocol=tcp sport=443 dport=58836 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "168.73.30.75", "serverIP": "19.21.0.225" }
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1691046552.421628048 NORDC_MX400_1 l7_firewall src=19.21.0.225 dst=168.73.30.75 protocol=tcp sport=443 dport=58836 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1691046552.421628048 NORDC_MX400_1 l7_firewall src=19.21.0.225 dst=168.73.30.75 protocol=tcp sport=443 dport=58836 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 58836 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 168.73.30.75 serverIP: 19.21.0.225
Explain this syslog message
<134>Original Address=50.243.215.201 1 1690916294.979712828 M92_MX67C_MECBraselton l7_firewall src=73.22.26.135 dst=174.129.55.81 protocol=tcp sport=51398 dport=443 decision=blocked
{ "action": "block", "clientport": 51398, "message": "<134>Original Address=50.243.215.201 1 1690916294.979712828 M92_MX67C_MECBraselton l7_firewall src=73.22.26.135 dst=174.129.55.81 protocol=tcp sport=51398 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "73.22.26.135", "serverIP": "174.129.55.81" }
Create a JSON artifact from the message
<134>Original Address=50.243.215.201 1 1690916294.979712828 M92_MX67C_MECBraselton l7_firewall src=73.22.26.135 dst=174.129.55.81 protocol=tcp sport=51398 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=50.243.215.201 1 1690916294.979712828 M92_MX67C_MECBraselton l7_firewall src=73.22.26.135 dst=174.129.55.81 protocol=tcp sport=51398 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 51398 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 73.22.26.135 serverIP: 174.129.55.81
Explain this syslog message
<134>Original Address=50.243.215.201 1 1690916294.979712828 M92_MX67C_MECBraselton l7_firewall src=121.3.66.253 dst=88.30.244.199 protocol=tcp sport=51398 dport=443 decision=blocked
{ "action": "block", "clientport": 51398, "message": "<134>Original Address=50.243.215.201 1 1690916294.979712828 M92_MX67C_MECBraselton l7_firewall src=121.3.66.253 dst=88.30.244.199 protocol=tcp sport=51398 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "121.3.66.253", "serverIP": "88.30.244.199" }
Create a JSON artifact from the message
<134>Original Address=50.243.215.201 1 1690916294.979712828 M92_MX67C_MECBraselton l7_firewall src=121.3.66.253 dst=88.30.244.199 protocol=tcp sport=51398 dport=443 decision=blocked
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=50.243.215.201 1 1690916294.979712828 M92_MX67C_MECBraselton l7_firewall src=121.3.66.253 dst=88.30.244.199 protocol=tcp sport=51398 dport=443 decision=blocked
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: action: block clientport: 51398 messagetype: anomalous_behavior program: l7_firewall protocol: 6 senderhost: 192.168.2.250 sensitivity: normal serverport: 443 sourceinfo: unknown tags: ['meraki_l7_firewall', 'anomalous_behavior'] streamName: meraki_l7_firewall clientIP: 121.3.66.253 serverIP: 88.30.244.199
Explain this syslog message
<134>Original Address=50.243.215.201 1 1690916294.979712828 M92_MX67C_MECBraselton l7_firewall src=237.13.227.132 dst=232.104.4.206 protocol=tcp sport=51398 dport=443 decision=blocked
{ "action": "block", "clientport": 51398, "message": "<134>Original Address=50.243.215.201 1 1690916294.979712828 M92_MX67C_MECBraselton l7_firewall src=237.13.227.132 dst=232.104.4.206 protocol=tcp sport=51398 dport=443 decision=blocked", "messagetype": "anomalous_behavior", "program": "l7_firewall", "protocol": 6, "senderhost": "192.168.2.250", "sensitivity": "normal", "serverport": 443, "sourceinfo": "unknown", "tags": [ "meraki_l7_firewall", "anomalous_behavior" ], "streamName": "meraki_l7_firewall", "clientIP": "237.13.227.132", "serverIP": "232.104.4.206" }
Create a JSON artifact from the message