input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3 values |
|---|---|---|
<134>Original Address=192.168.2.253 1 1690866505.173249782 NORDC_MX400_1 l7_firewall src=14.207.99.79 dst=38.105.14.182 protocol=tcp sport=62160 dport=443 decision=blocked | {
"action": "block",
"clientport": 62160,
"message": "<134>Original Address=192.168.2.253 1 1690866505.173249782 NORDC_MX400_1 l7_firewall src=14.207.99.79 dst=38.105.14.182 protocol=tcp sport=62160 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "14.207.99.79",
"serverIP": "38.105.14.182"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1690866505.173249782 NORDC_MX400_1 l7_firewall src=14.207.99.79 dst=38.105.14.182 protocol=tcp sport=62160 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1690866505.173249782 NORDC_MX400_1 l7_firewall src=14.207.99.79 dst=38.105.14.182 protocol=tcp sport=62160 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 62160
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 14.207.99.79
serverIP: 38.105.14.182 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1690866505.173249782 NORDC_MX400_1 l7_firewall src=135.43.207.91 dst=33.230.46.158 protocol=tcp sport=62160 dport=443 decision=blocked | {
"action": "block",
"clientport": 62160,
"message": "<134>Original Address=192.168.2.253 1 1690866505.173249782 NORDC_MX400_1 l7_firewall src=135.43.207.91 dst=33.230.46.158 protocol=tcp sport=62160 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "135.43.207.91",
"serverIP": "33.230.46.158"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1690866505.173249782 NORDC_MX400_1 l7_firewall src=135.43.207.91 dst=33.230.46.158 protocol=tcp sport=62160 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1690866505.173249782 NORDC_MX400_1 l7_firewall src=135.43.207.91 dst=33.230.46.158 protocol=tcp sport=62160 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 62160
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 135.43.207.91
serverIP: 33.230.46.158 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1690866505.173249782 NORDC_MX400_1 l7_firewall src=191.36.248.166 dst=209.255.151.64 protocol=tcp sport=62160 dport=443 decision=blocked | {
"action": "block",
"clientport": 62160,
"message": "<134>Original Address=192.168.2.253 1 1690866505.173249782 NORDC_MX400_1 l7_firewall src=191.36.248.166 dst=209.255.151.64 protocol=tcp sport=62160 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "191.36.248.166",
"serverIP": "209.255.151.64"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1690866505.173249782 NORDC_MX400_1 l7_firewall src=191.36.248.166 dst=209.255.151.64 protocol=tcp sport=62160 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1690866505.173249782 NORDC_MX400_1 l7_firewall src=191.36.248.166 dst=209.255.151.64 protocol=tcp sport=62160 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 62160
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 191.36.248.166
serverIP: 209.255.151.64 | Explain this syslog message |
<134>Original Address=10.11.22.1 1 1657569805.157088712 M22_MX67C_Marietta l7_firewall src=41.43.31.76 dst=116.70.194.248 protocol=tcp sport=50231 dport=80 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=10.11.22.1 1 1657569805.157088712 M22_MX67C_Marietta l7_firewall src=41.43.31.76 dst=116.70.194.248 protocol=tcp sport=50231 dport=80 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 50231,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "41.43.31.76",
"serverIP": "116.70.194.248"
} | Create a JSON artifact from the message |
<134>Original Address=10.11.22.1 1 1657569805.157088712 M22_MX67C_Marietta l7_firewall src=41.43.31.76 dst=116.70.194.248 protocol=tcp sport=50231 dport=80 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=10.11.22.1 1 1657569805.157088712 M22_MX67C_Marietta l7_firewall src=41.43.31.76 dst=116.70.194.248 protocol=tcp sport=50231 dport=80 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 50231
protocol: 6
streamName: meraki_l7_firewall
clientIP: 41.43.31.76
serverIP: 116.70.194.248 | Explain this syslog message |
<134>Original Address=10.11.22.1 1 1657569805.157088712 M22_MX67C_Marietta l7_firewall src=15.252.233.155 dst=227.7.7.18 protocol=tcp sport=50231 dport=80 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=10.11.22.1 1 1657569805.157088712 M22_MX67C_Marietta l7_firewall src=15.252.233.155 dst=227.7.7.18 protocol=tcp sport=50231 dport=80 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 50231,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "15.252.233.155",
"serverIP": "227.7.7.18"
} | Create a JSON artifact from the message |
<134>Original Address=10.11.22.1 1 1657569805.157088712 M22_MX67C_Marietta l7_firewall src=15.252.233.155 dst=227.7.7.18 protocol=tcp sport=50231 dport=80 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=10.11.22.1 1 1657569805.157088712 M22_MX67C_Marietta l7_firewall src=15.252.233.155 dst=227.7.7.18 protocol=tcp sport=50231 dport=80 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 50231
protocol: 6
streamName: meraki_l7_firewall
clientIP: 15.252.233.155
serverIP: 227.7.7.18 | Explain this syslog message |
<134>Original Address=10.11.22.1 1 1657569805.157088712 M22_MX67C_Marietta l7_firewall src=234.180.234.136 dst=145.226.60.97 protocol=tcp sport=50231 dport=80 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=10.11.22.1 1 1657569805.157088712 M22_MX67C_Marietta l7_firewall src=234.180.234.136 dst=145.226.60.97 protocol=tcp sport=50231 dport=80 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 50231,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "234.180.234.136",
"serverIP": "145.226.60.97"
} | Create a JSON artifact from the message |
<134>Original Address=10.11.22.1 1 1657569805.157088712 M22_MX67C_Marietta l7_firewall src=234.180.234.136 dst=145.226.60.97 protocol=tcp sport=50231 dport=80 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=10.11.22.1 1 1657569805.157088712 M22_MX67C_Marietta l7_firewall src=234.180.234.136 dst=145.226.60.97 protocol=tcp sport=50231 dport=80 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 50231
protocol: 6
streamName: meraki_l7_firewall
clientIP: 234.180.234.136
serverIP: 145.226.60.97 | Explain this syslog message |
<134>Original Address=10.11.22.1 1 1657569805.157088712 M22_MX67C_Marietta l7_firewall src=92.176.168.74 dst=42.32.66.66 protocol=tcp sport=50231 dport=80 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=10.11.22.1 1 1657569805.157088712 M22_MX67C_Marietta l7_firewall src=92.176.168.74 dst=42.32.66.66 protocol=tcp sport=50231 dport=80 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 50231,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "92.176.168.74",
"serverIP": "42.32.66.66"
} | Create a JSON artifact from the message |
<134>Original Address=10.11.22.1 1 1657569805.157088712 M22_MX67C_Marietta l7_firewall src=92.176.168.74 dst=42.32.66.66 protocol=tcp sport=50231 dport=80 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=10.11.22.1 1 1657569805.157088712 M22_MX67C_Marietta l7_firewall src=92.176.168.74 dst=42.32.66.66 protocol=tcp sport=50231 dport=80 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 50231
protocol: 6
streamName: meraki_l7_firewall
clientIP: 92.176.168.74
serverIP: 42.32.66.66 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1657569806.806819861 NORDC_MX400_1 l7_firewall src=25.90.89.222 dst=210.5.147.199 protocol=tcp sport=49662 dport=80 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1657569806.806819861 NORDC_MX400_1 l7_firewall src=25.90.89.222 dst=210.5.147.199 protocol=tcp sport=49662 dport=80 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 49662,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "25.90.89.222",
"serverIP": "210.5.147.199"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1657569806.806819861 NORDC_MX400_1 l7_firewall src=25.90.89.222 dst=210.5.147.199 protocol=tcp sport=49662 dport=80 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1657569806.806819861 NORDC_MX400_1 l7_firewall src=25.90.89.222 dst=210.5.147.199 protocol=tcp sport=49662 dport=80 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 49662
protocol: 6
streamName: meraki_l7_firewall
clientIP: 25.90.89.222
serverIP: 210.5.147.199 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1657569806.806819861 NORDC_MX400_1 l7_firewall src=230.203.141.57 dst=143.156.231.107 protocol=tcp sport=49662 dport=80 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1657569806.806819861 NORDC_MX400_1 l7_firewall src=230.203.141.57 dst=143.156.231.107 protocol=tcp sport=49662 dport=80 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 49662,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "230.203.141.57",
"serverIP": "143.156.231.107"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1657569806.806819861 NORDC_MX400_1 l7_firewall src=230.203.141.57 dst=143.156.231.107 protocol=tcp sport=49662 dport=80 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1657569806.806819861 NORDC_MX400_1 l7_firewall src=230.203.141.57 dst=143.156.231.107 protocol=tcp sport=49662 dport=80 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 49662
protocol: 6
streamName: meraki_l7_firewall
clientIP: 230.203.141.57
serverIP: 143.156.231.107 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1657569806.806819861 NORDC_MX400_1 l7_firewall src=11.214.192.227 dst=176.68.140.105 protocol=tcp sport=49662 dport=80 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1657569806.806819861 NORDC_MX400_1 l7_firewall src=11.214.192.227 dst=176.68.140.105 protocol=tcp sport=49662 dport=80 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 49662,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "11.214.192.227",
"serverIP": "176.68.140.105"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1657569806.806819861 NORDC_MX400_1 l7_firewall src=11.214.192.227 dst=176.68.140.105 protocol=tcp sport=49662 dport=80 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1657569806.806819861 NORDC_MX400_1 l7_firewall src=11.214.192.227 dst=176.68.140.105 protocol=tcp sport=49662 dport=80 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 49662
protocol: 6
streamName: meraki_l7_firewall
clientIP: 11.214.192.227
serverIP: 176.68.140.105 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1657569806.806819861 NORDC_MX400_1 l7_firewall src=101.168.9.147 dst=107.165.18.166 protocol=tcp sport=49662 dport=80 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1657569806.806819861 NORDC_MX400_1 l7_firewall src=101.168.9.147 dst=107.165.18.166 protocol=tcp sport=49662 dport=80 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 49662,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "101.168.9.147",
"serverIP": "107.165.18.166"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1657569806.806819861 NORDC_MX400_1 l7_firewall src=101.168.9.147 dst=107.165.18.166 protocol=tcp sport=49662 dport=80 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1657569806.806819861 NORDC_MX400_1 l7_firewall src=101.168.9.147 dst=107.165.18.166 protocol=tcp sport=49662 dport=80 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 80
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 49662
protocol: 6
streamName: meraki_l7_firewall
clientIP: 101.168.9.147
serverIP: 107.165.18.166 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659539387.750201812 NORDC_MX400_1 l7_firewall src=81.171.116.122 dst=20.56.125.43 protocol=tcp sport=56204 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659539387.750201812 NORDC_MX400_1 l7_firewall src=81.171.116.122 dst=20.56.125.43 protocol=tcp sport=56204 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 56204,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "81.171.116.122",
"serverIP": "20.56.125.43"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659539387.750201812 NORDC_MX400_1 l7_firewall src=81.171.116.122 dst=20.56.125.43 protocol=tcp sport=56204 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659539387.750201812 NORDC_MX400_1 l7_firewall src=81.171.116.122 dst=20.56.125.43 protocol=tcp sport=56204 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 56204
protocol: 6
streamName: meraki_l7_firewall
clientIP: 81.171.116.122
serverIP: 20.56.125.43 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659539387.750201812 NORDC_MX400_1 l7_firewall src=113.215.15.93 dst=113.84.136.33 protocol=tcp sport=56204 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659539387.750201812 NORDC_MX400_1 l7_firewall src=113.215.15.93 dst=113.84.136.33 protocol=tcp sport=56204 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 56204,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "113.215.15.93",
"serverIP": "113.84.136.33"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659539387.750201812 NORDC_MX400_1 l7_firewall src=113.215.15.93 dst=113.84.136.33 protocol=tcp sport=56204 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659539387.750201812 NORDC_MX400_1 l7_firewall src=113.215.15.93 dst=113.84.136.33 protocol=tcp sport=56204 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 56204
protocol: 6
streamName: meraki_l7_firewall
clientIP: 113.215.15.93
serverIP: 113.84.136.33 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659539387.750201812 NORDC_MX400_1 l7_firewall src=22.76.55.107 dst=57.243.13.67 protocol=tcp sport=56204 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659539387.750201812 NORDC_MX400_1 l7_firewall src=22.76.55.107 dst=57.243.13.67 protocol=tcp sport=56204 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 56204,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "22.76.55.107",
"serverIP": "57.243.13.67"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659539387.750201812 NORDC_MX400_1 l7_firewall src=22.76.55.107 dst=57.243.13.67 protocol=tcp sport=56204 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659539387.750201812 NORDC_MX400_1 l7_firewall src=22.76.55.107 dst=57.243.13.67 protocol=tcp sport=56204 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 56204
protocol: 6
streamName: meraki_l7_firewall
clientIP: 22.76.55.107
serverIP: 57.243.13.67 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659539387.750201812 NORDC_MX400_1 l7_firewall src=120.31.161.178 dst=202.171.216.78 protocol=tcp sport=56204 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659539387.750201812 NORDC_MX400_1 l7_firewall src=120.31.161.178 dst=202.171.216.78 protocol=tcp sport=56204 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 56204,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "120.31.161.178",
"serverIP": "202.171.216.78"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659539387.750201812 NORDC_MX400_1 l7_firewall src=120.31.161.178 dst=202.171.216.78 protocol=tcp sport=56204 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659539387.750201812 NORDC_MX400_1 l7_firewall src=120.31.161.178 dst=202.171.216.78 protocol=tcp sport=56204 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 56204
protocol: 6
streamName: meraki_l7_firewall
clientIP: 120.31.161.178
serverIP: 202.171.216.78 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659539656.741046995 NORDC_MX400_1 l7_firewall src=236.53.106.124 dst=87.184.209.117 protocol=tcp sport=59071 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659539656.741046995 NORDC_MX400_1 l7_firewall src=236.53.106.124 dst=87.184.209.117 protocol=tcp sport=59071 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 59071,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "236.53.106.124",
"serverIP": "87.184.209.117"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659539656.741046995 NORDC_MX400_1 l7_firewall src=236.53.106.124 dst=87.184.209.117 protocol=tcp sport=59071 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659539656.741046995 NORDC_MX400_1 l7_firewall src=236.53.106.124 dst=87.184.209.117 protocol=tcp sport=59071 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 59071
protocol: 6
streamName: meraki_l7_firewall
clientIP: 236.53.106.124
serverIP: 87.184.209.117 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659539656.741046995 NORDC_MX400_1 l7_firewall src=69.68.191.152 dst=243.189.136.135 protocol=tcp sport=59071 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659539656.741046995 NORDC_MX400_1 l7_firewall src=69.68.191.152 dst=243.189.136.135 protocol=tcp sport=59071 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 59071,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "69.68.191.152",
"serverIP": "243.189.136.135"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659539656.741046995 NORDC_MX400_1 l7_firewall src=69.68.191.152 dst=243.189.136.135 protocol=tcp sport=59071 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659539656.741046995 NORDC_MX400_1 l7_firewall src=69.68.191.152 dst=243.189.136.135 protocol=tcp sport=59071 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 59071
protocol: 6
streamName: meraki_l7_firewall
clientIP: 69.68.191.152
serverIP: 243.189.136.135 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659539656.741046995 NORDC_MX400_1 l7_firewall src=144.232.88.231 dst=199.144.56.111 protocol=tcp sport=59071 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659539656.741046995 NORDC_MX400_1 l7_firewall src=144.232.88.231 dst=199.144.56.111 protocol=tcp sport=59071 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 59071,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "144.232.88.231",
"serverIP": "199.144.56.111"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659539656.741046995 NORDC_MX400_1 l7_firewall src=144.232.88.231 dst=199.144.56.111 protocol=tcp sport=59071 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659539656.741046995 NORDC_MX400_1 l7_firewall src=144.232.88.231 dst=199.144.56.111 protocol=tcp sport=59071 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 59071
protocol: 6
streamName: meraki_l7_firewall
clientIP: 144.232.88.231
serverIP: 199.144.56.111 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659539656.741046995 NORDC_MX400_1 l7_firewall src=212.51.27.200 dst=121.212.38.43 protocol=tcp sport=59071 dport=443 decision=blocked | {
"program": "l7_firewall",
"senderhost": "192.168.2.250",
"serverport": 443,
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"productids": [
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659539656.741046995 NORDC_MX400_1 l7_firewall src=212.51.27.200 dst=121.212.38.43 protocol=tcp sport=59071 dport=443 decision=blocked",
"action": "block",
"sensitivity": "normal",
"messagetype": "anomalous_behavior",
"clientport": 59071,
"protocol": 6,
"streamName": "meraki_l7_firewall",
"clientIP": "212.51.27.200",
"serverIP": "121.212.38.43"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659539656.741046995 NORDC_MX400_1 l7_firewall src=212.51.27.200 dst=121.212.38.43 protocol=tcp sport=59071 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659539656.741046995 NORDC_MX400_1 l7_firewall src=212.51.27.200 dst=121.212.38.43 protocol=tcp sport=59071 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
program: l7_firewall
senderhost: 192.168.2.250
serverport: 443
tags: ['meraki_l7_firewall', 'anomalous_behavior']
productids: [0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: anomalous_behavior
clientport: 59071
protocol: 6
streamName: meraki_l7_firewall
clientIP: 212.51.27.200
serverIP: 121.212.38.43 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1688212397.620203483 NORDC_MX400_1 l7_firewall src=146.161.185.35 dst=195.91.123.206 protocol=udp sport=58676 dport=45823 decision=blocked | {
"action": "block",
"clientport": 58676,
"message": "<134>Original Address=192.168.2.253 1 1688212397.620203483 NORDC_MX400_1 l7_firewall src=146.161.185.35 dst=195.91.123.206 protocol=udp sport=58676 dport=45823 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 45823,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "146.161.185.35",
"serverIP": "195.91.123.206"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1688212397.620203483 NORDC_MX400_1 l7_firewall src=146.161.185.35 dst=195.91.123.206 protocol=udp sport=58676 dport=45823 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1688212397.620203483 NORDC_MX400_1 l7_firewall src=146.161.185.35 dst=195.91.123.206 protocol=udp sport=58676 dport=45823 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 58676
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 45823
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 146.161.185.35
serverIP: 195.91.123.206 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1688212397.620203483 NORDC_MX400_1 l7_firewall src=127.65.129.176 dst=220.142.52.124 protocol=udp sport=58676 dport=45823 decision=blocked | {
"action": "block",
"clientport": 58676,
"message": "<134>Original Address=192.168.2.253 1 1688212397.620203483 NORDC_MX400_1 l7_firewall src=127.65.129.176 dst=220.142.52.124 protocol=udp sport=58676 dport=45823 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 45823,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "127.65.129.176",
"serverIP": "220.142.52.124"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1688212397.620203483 NORDC_MX400_1 l7_firewall src=127.65.129.176 dst=220.142.52.124 protocol=udp sport=58676 dport=45823 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1688212397.620203483 NORDC_MX400_1 l7_firewall src=127.65.129.176 dst=220.142.52.124 protocol=udp sport=58676 dport=45823 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 58676
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 45823
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 127.65.129.176
serverIP: 220.142.52.124 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1688212397.620203483 NORDC_MX400_1 l7_firewall src=245.78.66.157 dst=63.107.251.131 protocol=udp sport=58676 dport=45823 decision=blocked | {
"action": "block",
"clientport": 58676,
"message": "<134>Original Address=192.168.2.253 1 1688212397.620203483 NORDC_MX400_1 l7_firewall src=245.78.66.157 dst=63.107.251.131 protocol=udp sport=58676 dport=45823 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 45823,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "245.78.66.157",
"serverIP": "63.107.251.131"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1688212397.620203483 NORDC_MX400_1 l7_firewall src=245.78.66.157 dst=63.107.251.131 protocol=udp sport=58676 dport=45823 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1688212397.620203483 NORDC_MX400_1 l7_firewall src=245.78.66.157 dst=63.107.251.131 protocol=udp sport=58676 dport=45823 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 58676
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 45823
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 245.78.66.157
serverIP: 63.107.251.131 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1688212397.620203483 NORDC_MX400_1 l7_firewall src=250.208.181.49 dst=181.50.249.23 protocol=udp sport=58676 dport=45823 decision=blocked | {
"action": "block",
"clientport": 58676,
"message": "<134>Original Address=192.168.2.253 1 1688212397.620203483 NORDC_MX400_1 l7_firewall src=250.208.181.49 dst=181.50.249.23 protocol=udp sport=58676 dport=45823 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 17,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 45823,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "250.208.181.49",
"serverIP": "181.50.249.23"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1688212397.620203483 NORDC_MX400_1 l7_firewall src=250.208.181.49 dst=181.50.249.23 protocol=udp sport=58676 dport=45823 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1688212397.620203483 NORDC_MX400_1 l7_firewall src=250.208.181.49 dst=181.50.249.23 protocol=udp sport=58676 dport=45823 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 58676
messagetype: anomalous_behavior
program: l7_firewall
protocol: 17
senderhost: 192.168.2.250
sensitivity: normal
serverport: 45823
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 250.208.181.49
serverIP: 181.50.249.23 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1691050704.178176005 NORDC_MX400_1 l7_firewall src=183.70.5.150 dst=25.118.245.114 protocol=tcp sport=443 dport=53762 decision=blocked | {
"action": "block",
"clientport": 53762,
"message": "<134>Original Address=192.168.2.253 1 1691050704.178176005 NORDC_MX400_1 l7_firewall src=183.70.5.150 dst=25.118.245.114 protocol=tcp sport=443 dport=53762 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "25.118.245.114",
"serverIP": "183.70.5.150"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1691050704.178176005 NORDC_MX400_1 l7_firewall src=183.70.5.150 dst=25.118.245.114 protocol=tcp sport=443 dport=53762 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1691050704.178176005 NORDC_MX400_1 l7_firewall src=183.70.5.150 dst=25.118.245.114 protocol=tcp sport=443 dport=53762 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 53762
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 25.118.245.114
serverIP: 183.70.5.150 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1691050704.178176005 NORDC_MX400_1 l7_firewall src=80.43.98.150 dst=51.202.176.220 protocol=tcp sport=443 dport=53762 decision=blocked | {
"action": "block",
"clientport": 53762,
"message": "<134>Original Address=192.168.2.253 1 1691050704.178176005 NORDC_MX400_1 l7_firewall src=80.43.98.150 dst=51.202.176.220 protocol=tcp sport=443 dport=53762 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "51.202.176.220",
"serverIP": "80.43.98.150"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1691050704.178176005 NORDC_MX400_1 l7_firewall src=80.43.98.150 dst=51.202.176.220 protocol=tcp sport=443 dport=53762 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1691050704.178176005 NORDC_MX400_1 l7_firewall src=80.43.98.150 dst=51.202.176.220 protocol=tcp sport=443 dport=53762 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 53762
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 51.202.176.220
serverIP: 80.43.98.150 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1691050704.178176005 NORDC_MX400_1 l7_firewall src=5.195.197.200 dst=132.231.176.99 protocol=tcp sport=443 dport=53762 decision=blocked | {
"action": "block",
"clientport": 53762,
"message": "<134>Original Address=192.168.2.253 1 1691050704.178176005 NORDC_MX400_1 l7_firewall src=5.195.197.200 dst=132.231.176.99 protocol=tcp sport=443 dport=53762 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "132.231.176.99",
"serverIP": "5.195.197.200"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1691050704.178176005 NORDC_MX400_1 l7_firewall src=5.195.197.200 dst=132.231.176.99 protocol=tcp sport=443 dport=53762 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1691050704.178176005 NORDC_MX400_1 l7_firewall src=5.195.197.200 dst=132.231.176.99 protocol=tcp sport=443 dport=53762 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 53762
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 132.231.176.99
serverIP: 5.195.197.200 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1691050704.178176005 NORDC_MX400_1 l7_firewall src=29.215.99.68 dst=136.180.145.177 protocol=tcp sport=443 dport=53762 decision=blocked | {
"action": "block",
"clientport": 53762,
"message": "<134>Original Address=192.168.2.253 1 1691050704.178176005 NORDC_MX400_1 l7_firewall src=29.215.99.68 dst=136.180.145.177 protocol=tcp sport=443 dport=53762 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "136.180.145.177",
"serverIP": "29.215.99.68"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1691050704.178176005 NORDC_MX400_1 l7_firewall src=29.215.99.68 dst=136.180.145.177 protocol=tcp sport=443 dport=53762 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1691050704.178176005 NORDC_MX400_1 l7_firewall src=29.215.99.68 dst=136.180.145.177 protocol=tcp sport=443 dport=53762 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 53762
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 136.180.145.177
serverIP: 29.215.99.68 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1691046552.421628048 NORDC_MX400_1 l7_firewall src=221.123.220.109 dst=191.186.15.57 protocol=tcp sport=443 dport=58836 decision=blocked | {
"action": "block",
"clientport": 58836,
"message": "<134>Original Address=192.168.2.253 1 1691046552.421628048 NORDC_MX400_1 l7_firewall src=221.123.220.109 dst=191.186.15.57 protocol=tcp sport=443 dport=58836 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "191.186.15.57",
"serverIP": "221.123.220.109"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1691046552.421628048 NORDC_MX400_1 l7_firewall src=221.123.220.109 dst=191.186.15.57 protocol=tcp sport=443 dport=58836 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1691046552.421628048 NORDC_MX400_1 l7_firewall src=221.123.220.109 dst=191.186.15.57 protocol=tcp sport=443 dport=58836 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 58836
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 191.186.15.57
serverIP: 221.123.220.109 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1691046552.421628048 NORDC_MX400_1 l7_firewall src=175.139.24.39 dst=86.0.69.204 protocol=tcp sport=443 dport=58836 decision=blocked | {
"action": "block",
"clientport": 58836,
"message": "<134>Original Address=192.168.2.253 1 1691046552.421628048 NORDC_MX400_1 l7_firewall src=175.139.24.39 dst=86.0.69.204 protocol=tcp sport=443 dport=58836 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "86.0.69.204",
"serverIP": "175.139.24.39"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1691046552.421628048 NORDC_MX400_1 l7_firewall src=175.139.24.39 dst=86.0.69.204 protocol=tcp sport=443 dport=58836 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1691046552.421628048 NORDC_MX400_1 l7_firewall src=175.139.24.39 dst=86.0.69.204 protocol=tcp sport=443 dport=58836 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 58836
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 86.0.69.204
serverIP: 175.139.24.39 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1691046552.421628048 NORDC_MX400_1 l7_firewall src=114.206.191.47 dst=28.117.121.148 protocol=tcp sport=443 dport=58836 decision=blocked | {
"action": "block",
"clientport": 58836,
"message": "<134>Original Address=192.168.2.253 1 1691046552.421628048 NORDC_MX400_1 l7_firewall src=114.206.191.47 dst=28.117.121.148 protocol=tcp sport=443 dport=58836 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "28.117.121.148",
"serverIP": "114.206.191.47"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1691046552.421628048 NORDC_MX400_1 l7_firewall src=114.206.191.47 dst=28.117.121.148 protocol=tcp sport=443 dport=58836 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1691046552.421628048 NORDC_MX400_1 l7_firewall src=114.206.191.47 dst=28.117.121.148 protocol=tcp sport=443 dport=58836 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 58836
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 28.117.121.148
serverIP: 114.206.191.47 | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1691046552.421628048 NORDC_MX400_1 l7_firewall src=19.21.0.225 dst=168.73.30.75 protocol=tcp sport=443 dport=58836 decision=blocked | {
"action": "block",
"clientport": 58836,
"message": "<134>Original Address=192.168.2.253 1 1691046552.421628048 NORDC_MX400_1 l7_firewall src=19.21.0.225 dst=168.73.30.75 protocol=tcp sport=443 dport=58836 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "168.73.30.75",
"serverIP": "19.21.0.225"
} | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1691046552.421628048 NORDC_MX400_1 l7_firewall src=19.21.0.225 dst=168.73.30.75 protocol=tcp sport=443 dport=58836 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1691046552.421628048 NORDC_MX400_1 l7_firewall src=19.21.0.225 dst=168.73.30.75 protocol=tcp sport=443 dport=58836 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 58836
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 168.73.30.75
serverIP: 19.21.0.225 | Explain this syslog message |
<134>Original Address=50.243.215.201 1 1690916294.979712828 M92_MX67C_MECBraselton l7_firewall src=73.22.26.135 dst=174.129.55.81 protocol=tcp sport=51398 dport=443 decision=blocked | {
"action": "block",
"clientport": 51398,
"message": "<134>Original Address=50.243.215.201 1 1690916294.979712828 M92_MX67C_MECBraselton l7_firewall src=73.22.26.135 dst=174.129.55.81 protocol=tcp sport=51398 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "73.22.26.135",
"serverIP": "174.129.55.81"
} | Create a JSON artifact from the message |
<134>Original Address=50.243.215.201 1 1690916294.979712828 M92_MX67C_MECBraselton l7_firewall src=73.22.26.135 dst=174.129.55.81 protocol=tcp sport=51398 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=50.243.215.201 1 1690916294.979712828 M92_MX67C_MECBraselton l7_firewall src=73.22.26.135 dst=174.129.55.81 protocol=tcp sport=51398 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 51398
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 73.22.26.135
serverIP: 174.129.55.81 | Explain this syslog message |
<134>Original Address=50.243.215.201 1 1690916294.979712828 M92_MX67C_MECBraselton l7_firewall src=121.3.66.253 dst=88.30.244.199 protocol=tcp sport=51398 dport=443 decision=blocked | {
"action": "block",
"clientport": 51398,
"message": "<134>Original Address=50.243.215.201 1 1690916294.979712828 M92_MX67C_MECBraselton l7_firewall src=121.3.66.253 dst=88.30.244.199 protocol=tcp sport=51398 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "121.3.66.253",
"serverIP": "88.30.244.199"
} | Create a JSON artifact from the message |
<134>Original Address=50.243.215.201 1 1690916294.979712828 M92_MX67C_MECBraselton l7_firewall src=121.3.66.253 dst=88.30.244.199 protocol=tcp sport=51398 dport=443 decision=blocked | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=50.243.215.201 1 1690916294.979712828 M92_MX67C_MECBraselton l7_firewall src=121.3.66.253 dst=88.30.244.199 protocol=tcp sport=51398 dport=443 decision=blocked | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
action: block
clientport: 51398
messagetype: anomalous_behavior
program: l7_firewall
protocol: 6
senderhost: 192.168.2.250
sensitivity: normal
serverport: 443
sourceinfo: unknown
tags: ['meraki_l7_firewall', 'anomalous_behavior']
streamName: meraki_l7_firewall
clientIP: 121.3.66.253
serverIP: 88.30.244.199 | Explain this syslog message |
<134>Original Address=50.243.215.201 1 1690916294.979712828 M92_MX67C_MECBraselton l7_firewall src=237.13.227.132 dst=232.104.4.206 protocol=tcp sport=51398 dport=443 decision=blocked | {
"action": "block",
"clientport": 51398,
"message": "<134>Original Address=50.243.215.201 1 1690916294.979712828 M92_MX67C_MECBraselton l7_firewall src=237.13.227.132 dst=232.104.4.206 protocol=tcp sport=51398 dport=443 decision=blocked",
"messagetype": "anomalous_behavior",
"program": "l7_firewall",
"protocol": 6,
"senderhost": "192.168.2.250",
"sensitivity": "normal",
"serverport": 443,
"sourceinfo": "unknown",
"tags": [
"meraki_l7_firewall",
"anomalous_behavior"
],
"streamName": "meraki_l7_firewall",
"clientIP": "237.13.227.132",
"serverIP": "232.104.4.206"
} | Create a JSON artifact from the message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.