input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3
values |
|---|---|---|
<164>Aug 30 2022 20:01:00: %ASA-4-106023: Deny udp src outside:212.18.2.238/31240 dst dmz-1:112.33.252.103/514 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
s... | Explain this syslog message |
<164>Aug 30 2022 20:01:00: %ASA-4-106023: Deny udp src outside:71.163.201.178/31240 dst dmz-1:163.60.42.6/514 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Aug 30 2022 20:01:00: %ASA-4-106023: Deny udp src outside:71.163.201.178/31240 dst dmz-1:163.60.42.6/514 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 30 2022 20:01:00: %ASA-4-106023: Deny udp src outside:71.163.201.178/31240 dst dmz-1:163.60.42.6/514 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
s... | Explain this syslog message |
<164>Aug 30 2022 20:01:00: %ASA-4-106023: Deny udp src outside:35.72.105.206/31240 dst dmz-1:101.48.10.159/514 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Aug 30 2022 20:01:00: %ASA-4-106023: Deny udp src outside:35.72.105.206/31240 dst dmz-1:101.48.10.159/514 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 30 2022 20:01:00: %ASA-4-106023: Deny udp src outside:35.72.105.206/31240 dst dmz-1:101.48.10.159/514 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
s... | Explain this syslog message |
<164>Aug 30 2022 20:01:00: %ASA-4-106023: Deny udp src outside:150.71.220.97/31240 dst dmz-1:223.218.34.51/514 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Aug 30 2022 20:01:00: %ASA-4-106023: Deny udp src outside:150.71.220.97/31240 dst dmz-1:223.218.34.51/514 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 30 2022 20:01:00: %ASA-4-106023: Deny udp src outside:150.71.220.97/31240 dst dmz-1:223.218.34.51/514 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
s... | Explain this syslog message |
<164>Aug 30 2022 20:01:37: %ASA-4-106023: Deny udp src outside:27.252.76.136/31240 dst dmz-1:186.72.65.37/514 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Aug 30 2022 20:01:37: %ASA-4-106023: Deny udp src outside:27.252.76.136/31240 dst dmz-1:186.72.65.37/514 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 30 2022 20:01:37: %ASA-4-106023: Deny udp src outside:27.252.76.136/31240 dst dmz-1:186.72.65.37/514 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
s... | Explain this syslog message |
<164>Aug 30 2022 20:01:37: %ASA-4-106023: Deny udp src outside:127.79.103.161/31240 dst dmz-1:241.28.51.187/514 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Aug 30 2022 20:01:37: %ASA-4-106023: Deny udp src outside:127.79.103.161/31240 dst dmz-1:241.28.51.187/514 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 30 2022 20:01:37: %ASA-4-106023: Deny udp src outside:127.79.103.161/31240 dst dmz-1:241.28.51.187/514 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
s... | Explain this syslog message |
<164>Aug 30 2022 20:01:37: %ASA-4-106023: Deny udp src outside:36.27.12.74/31240 dst dmz-1:220.210.180.241/514 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Aug 30 2022 20:01:37: %ASA-4-106023: Deny udp src outside:36.27.12.74/31240 dst dmz-1:220.210.180.241/514 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 30 2022 20:01:37: %ASA-4-106023: Deny udp src outside:36.27.12.74/31240 dst dmz-1:220.210.180.241/514 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
s... | Explain this syslog message |
<164>Aug 30 2022 20:01:37: %ASA-4-106023: Deny udp src outside:202.190.101.157/31240 dst dmz-1:99.12.98.108/514 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 514,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Aug 30 2022 20:01:37: %ASA-4-106023: Deny udp src outside:202.190.101.157/31240 dst dmz-1:99.12.98.108/514 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 30 2022 20:01:37: %ASA-4-106023: Deny udp src outside:202.190.101.157/31240 dst dmz-1:99.12.98.108/514 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 514
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
s... | Explain this syslog message |
<164>Aug 30 2022 20:02:14: %ASA-4-106023: Deny tcp src outside:204.161.127.29/58848 dst dmz-1:3.207.16.134/22 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 22,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Aug 30 2022 20:02:14: %ASA-4-106023: Deny tcp src outside:204.161.127.29/58848 dst dmz-1:3.207.16.134/22 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 30 2022 20:02:14: %ASA-4-106023: Deny tcp src outside:204.161.127.29/58848 dst dmz-1:3.207.16.134/22 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 22
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
se... | Explain this syslog message |
<164>Aug 30 2022 20:02:14: %ASA-4-106023: Deny tcp src outside:106.75.89.69/58848 dst dmz-1:163.210.114.236/22 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 22,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Aug 30 2022 20:02:14: %ASA-4-106023: Deny tcp src outside:106.75.89.69/58848 dst dmz-1:163.210.114.236/22 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 30 2022 20:02:14: %ASA-4-106023: Deny tcp src outside:106.75.89.69/58848 dst dmz-1:163.210.114.236/22 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 22
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
se... | Explain this syslog message |
<164>Aug 30 2022 20:02:24: %ASA-4-106023: Deny tcp src outside:38.195.33.251/38146 dst dmz-1:108.244.45.212/5242 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 5242,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Aug 30 2022 20:02:24: %ASA-4-106023: Deny tcp src outside:38.195.33.251/38146 dst dmz-1:108.244.45.212/5242 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 30 2022 20:02:24: %ASA-4-106023: Deny tcp src outside:38.195.33.251/38146 dst dmz-1:108.244.45.212/5242 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 5242
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
... | Explain this syslog message |
<164>Aug 30 2022 20:02:24: %ASA-4-106023: Deny tcp src outside:164.176.75.62/38146 dst dmz-1:33.94.158.91/5242 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 5242,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Aug 30 2022 20:02:24: %ASA-4-106023: Deny tcp src outside:164.176.75.62/38146 dst dmz-1:33.94.158.91/5242 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Aug 30 2022 20:02:24: %ASA-4-106023: Deny tcp src outside:164.176.75.62/38146 dst dmz-1:33.94.158.91/5242 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 5242
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
... | Explain this syslog message |
<134>Original Address=24.248.123.90 1 1659305585.245002055 M44_MX67C_WarnerRobins flows src=21.69.46.24 dst=107.99.147.52 protocol=tcp sport=15736 dport=12451 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 12451,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.248.123.90 1 1659305585.245002055 M44_MX67C_WarnerRobins flows src=21... | Create a JSON artifact from the message |
<134>Original Address=24.248.123.90 1 1659305585.245002055 M44_MX67C_WarnerRobins flows src=21.69.46.24 dst=107.99.147.52 protocol=tcp sport=15736 dport=12451 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.248.123.90 1 1659305585.245002055 M44_MX67C_WarnerRobins flows src=21.69.46.24 dst=107.99.147.52 protocol=tcp sport=15736 dport=12451 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 12451
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 15736
protocol: 6
str... | Explain this syslog message |
<134>Original Address=24.248.123.90 1 1659305585.245002055 M44_MX67C_WarnerRobins flows src=78.186.158.16 dst=222.156.251.52 protocol=tcp sport=15736 dport=12451 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 12451,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.248.123.90 1 1659305585.245002055 M44_MX67C_WarnerRobins flows src=78... | Create a JSON artifact from the message |
<134>Original Address=24.248.123.90 1 1659305585.245002055 M44_MX67C_WarnerRobins flows src=78.186.158.16 dst=222.156.251.52 protocol=tcp sport=15736 dport=12451 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.248.123.90 1 1659305585.245002055 M44_MX67C_WarnerRobins flows src=78.186.158.16 dst=222.156.251.52 protocol=tcp sport=15736 dport=12451 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 12451
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 15736
protocol: 6
str... | Explain this syslog message |
<134>Original Address=24.248.123.90 1 1659305585.245002055 M44_MX67C_WarnerRobins flows src=121.139.220.161 dst=140.234.101.165 protocol=tcp sport=15736 dport=12451 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 12451,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.248.123.90 1 1659305585.245002055 M44_MX67C_WarnerRobins flows src=12... | Create a JSON artifact from the message |
<134>Original Address=24.248.123.90 1 1659305585.245002055 M44_MX67C_WarnerRobins flows src=121.139.220.161 dst=140.234.101.165 protocol=tcp sport=15736 dport=12451 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.248.123.90 1 1659305585.245002055 M44_MX67C_WarnerRobins flows src=121.139.220.161 dst=140.234.101.165 protocol=tcp sport=15736 dport=12451 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 12451
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 15736
protocol: 6
str... | Explain this syslog message |
<134>Original Address=24.248.123.90 1 1659305585.245002055 M44_MX67C_WarnerRobins flows src=161.161.213.42 dst=33.177.106.88 protocol=tcp sport=15736 dport=12451 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 12451,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=24.248.123.90 1 1659305585.245002055 M44_MX67C_WarnerRobins flows src=16... | Create a JSON artifact from the message |
<134>Original Address=24.248.123.90 1 1659305585.245002055 M44_MX67C_WarnerRobins flows src=161.161.213.42 dst=33.177.106.88 protocol=tcp sport=15736 dport=12451 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=24.248.123.90 1 1659305585.245002055 M44_MX67C_WarnerRobins flows src=161.161.213.42 dst=33.177.106.88 protocol=tcp sport=15736 dport=12451 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 12451
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 15736
protocol: 6
str... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659305577.442762532 NORDC_MX400_1 flows src=53.134.15.148 dst=127.62.186.200 protocol=tcp sport=60589 dport=80 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659305577.442762532 NORDC_MX400_1 flows src=53.134.15.148 ... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659305577.442762532 NORDC_MX400_1 flows src=53.134.15.148 dst=127.62.186.200 protocol=tcp sport=60589 dport=80 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659305577.442762532 NORDC_MX400_1 flows src=53.134.15.148 dst=127.62.186.200 protocol=tcp sport=60589 dport=80 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 80
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 60589
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659305577.442762532 NORDC_MX400_1 flows src=212.125.185.213 dst=234.101.16.78 protocol=tcp sport=60589 dport=80 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659305577.442762532 NORDC_MX400_1 flows src=212.125.185.21... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659305577.442762532 NORDC_MX400_1 flows src=212.125.185.213 dst=234.101.16.78 protocol=tcp sport=60589 dport=80 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659305577.442762532 NORDC_MX400_1 flows src=212.125.185.213 dst=234.101.16.78 protocol=tcp sport=60589 dport=80 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 80
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 60589
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659305577.442762532 NORDC_MX400_1 flows src=242.82.124.179 dst=5.21.69.59 protocol=tcp sport=60589 dport=80 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659305577.442762532 NORDC_MX400_1 flows src=242.82.124.179... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659305577.442762532 NORDC_MX400_1 flows src=242.82.124.179 dst=5.21.69.59 protocol=tcp sport=60589 dport=80 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659305577.442762532 NORDC_MX400_1 flows src=242.82.124.179 dst=5.21.69.59 protocol=tcp sport=60589 dport=80 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 80
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 60589
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659305577.442762532 NORDC_MX400_1 flows src=97.12.170.118 dst=180.223.88.25 protocol=tcp sport=60589 dport=80 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 80,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659305577.442762532 NORDC_MX400_1 flows src=97.12.170.118 ... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659305577.442762532 NORDC_MX400_1 flows src=97.12.170.118 dst=180.223.88.25 protocol=tcp sport=60589 dport=80 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659305577.442762532 NORDC_MX400_1 flows src=97.12.170.118 dst=180.223.88.25 protocol=tcp sport=60589 dport=80 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 80
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 60589
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659305829.579841616 NORDC_MX400_1 flows src=82.73.92.238 dst=61.93.127.95 protocol=tcp sport=19919 dport=1557 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 1557,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659305829.579841616 NORDC_MX400_1 flows src=82.73.92.238... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659305829.579841616 NORDC_MX400_1 flows src=82.73.92.238 dst=61.93.127.95 protocol=tcp sport=19919 dport=1557 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659305829.579841616 NORDC_MX400_1 flows src=82.73.92.238 dst=61.93.127.95 protocol=tcp sport=19919 dport=1557 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 1557
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 19919
protocol: 6
stre... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659305829.579841616 NORDC_MX400_1 flows src=58.94.245.73 dst=107.231.109.217 protocol=tcp sport=19919 dport=1557 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 1557,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659305829.579841616 NORDC_MX400_1 flows src=58.94.245.73... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659305829.579841616 NORDC_MX400_1 flows src=58.94.245.73 dst=107.231.109.217 protocol=tcp sport=19919 dport=1557 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659305829.579841616 NORDC_MX400_1 flows src=58.94.245.73 dst=107.231.109.217 protocol=tcp sport=19919 dport=1557 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 1557
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 19919
protocol: 6
stre... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659305829.579841616 NORDC_MX400_1 flows src=153.214.4.200 dst=19.235.54.214 protocol=tcp sport=19919 dport=1557 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 1557,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659305829.579841616 NORDC_MX400_1 flows src=153.214.4.20... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659305829.579841616 NORDC_MX400_1 flows src=153.214.4.200 dst=19.235.54.214 protocol=tcp sport=19919 dport=1557 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659305829.579841616 NORDC_MX400_1 flows src=153.214.4.200 dst=19.235.54.214 protocol=tcp sport=19919 dport=1557 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 1557
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 19919
protocol: 6
stre... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659305829.579841616 NORDC_MX400_1 flows src=16.82.138.190 dst=8.6.128.26 protocol=tcp sport=19919 dport=1557 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 1557,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659305829.579841616 NORDC_MX400_1 flows src=16.82.138.19... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659305829.579841616 NORDC_MX400_1 flows src=16.82.138.190 dst=8.6.128.26 protocol=tcp sport=19919 dport=1557 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659305829.579841616 NORDC_MX400_1 flows src=16.82.138.190 dst=8.6.128.26 protocol=tcp sport=19919 dport=1557 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 1557
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 19919
protocol: 6
stre... | Explain this syslog message |
<134>Original Address=5.246.186.245 1 1660341417.648877984 M38_MX67C_Conyers flows src=196.182.198.26 dst=5.246.186.245 protocol=udp sport=14636 dport=8082 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 8082,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=5.246.186.245 1 1660341417.648877984 M38_MX67C_Conyers flows src=196.182.... | Create a JSON artifact from the message |
<134>Original Address=5.246.186.245 1 1660341417.648877984 M38_MX67C_Conyers flows src=196.182.198.26 dst=5.246.186.245 protocol=udp sport=14636 dport=8082 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=5.246.186.245 1 1660341417.648877984 M38_MX67C_Conyers flows src=196.182.198.26 dst=5.246.186.245 protocol=udp sport=14636 dport=8082 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 8082
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 14636
protocol: 17
str... | Explain this syslog message |
<134>Original Address=40.159.209.157 1 1660341417.648877984 M38_MX67C_Conyers flows src=33.76.107.194 dst=40.159.209.157 protocol=udp sport=14636 dport=8082 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 8082,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=40.159.209.157 1 1660341417.648877984 M38_MX67C_Conyers flows src=33.76.1... | Create a JSON artifact from the message |
<134>Original Address=40.159.209.157 1 1660341417.648877984 M38_MX67C_Conyers flows src=33.76.107.194 dst=40.159.209.157 protocol=udp sport=14636 dport=8082 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=40.159.209.157 1 1660341417.648877984 M38_MX67C_Conyers flows src=33.76.107.194 dst=40.159.209.157 protocol=udp sport=14636 dport=8082 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 8082
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 14636
protocol: 17
str... | Explain this syslog message |
<134>Original Address=146.56.42.2 1 1660341417.648877984 M38_MX67C_Conyers flows src=187.44.72.154 dst=146.56.42.2 protocol=udp sport=14636 dport=8082 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 8082,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=146.56.42.2 1 1660341417.648877984 M38_MX67C_Conyers flows src=187.44.72.... | Create a JSON artifact from the message |
<134>Original Address=146.56.42.2 1 1660341417.648877984 M38_MX67C_Conyers flows src=187.44.72.154 dst=146.56.42.2 protocol=udp sport=14636 dport=8082 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=146.56.42.2 1 1660341417.648877984 M38_MX67C_Conyers flows src=187.44.72.154 dst=146.56.42.2 protocol=udp sport=14636 dport=8082 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 8082
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 14636
protocol: 17
str... | Explain this syslog message |
<134>Original Address=58.87.247.162 1 1660341417.648877984 M38_MX67C_Conyers flows src=255.241.69.196 dst=58.87.247.162 protocol=udp sport=14636 dport=8082 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 8082,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=58.87.247.162 1 1660341417.648877984 M38_MX67C_Conyers flows src=255.241.... | Create a JSON artifact from the message |
<134>Original Address=58.87.247.162 1 1660341417.648877984 M38_MX67C_Conyers flows src=255.241.69.196 dst=58.87.247.162 protocol=udp sport=14636 dport=8082 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=58.87.247.162 1 1660341417.648877984 M38_MX67C_Conyers flows src=255.241.69.196 dst=58.87.247.162 protocol=udp sport=14636 dport=8082 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 8082
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 14636
protocol: 17
str... | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1660344803.000089912 M34_MX67C_Atlanta flows src=51.143.31.86 dst=8.224.41.177 protocol=tcp sport=50404 dport=5555 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 5555,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1660344803.000089912 M34_MX67C_Atlanta flows src=51.143.3... | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1660344803.000089912 M34_MX67C_Atlanta flows src=51.143.31.86 dst=8.224.41.177 protocol=tcp sport=50404 dport=5555 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1660344803.000089912 M34_MX67C_Atlanta flows src=51.143.31.86 dst=8.224.41.177 protocol=tcp sport=50404 dport=5555 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5555
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 50404
protocol: 6
stre... | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1660344803.000089912 M34_MX67C_Atlanta flows src=197.82.173.140 dst=108.3.218.32 protocol=tcp sport=50404 dport=5555 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 5555,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1660344803.000089912 M34_MX67C_Atlanta flows src=197.82.1... | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1660344803.000089912 M34_MX67C_Atlanta flows src=197.82.173.140 dst=108.3.218.32 protocol=tcp sport=50404 dport=5555 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1660344803.000089912 M34_MX67C_Atlanta flows src=197.82.173.140 dst=108.3.218.32 protocol=tcp sport=50404 dport=5555 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5555
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 50404
protocol: 6
stre... | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1660344803.000089912 M34_MX67C_Atlanta flows src=244.68.144.244 dst=29.125.35.62 protocol=tcp sport=50404 dport=5555 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 5555,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1660344803.000089912 M34_MX67C_Atlanta flows src=244.68.1... | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1660344803.000089912 M34_MX67C_Atlanta flows src=244.68.144.244 dst=29.125.35.62 protocol=tcp sport=50404 dport=5555 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1660344803.000089912 M34_MX67C_Atlanta flows src=244.68.144.244 dst=29.125.35.62 protocol=tcp sport=50404 dport=5555 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5555
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 50404
protocol: 6
stre... | Explain this syslog message |
<134>Original Address=96.73.199.109 1 1660344803.000089912 M34_MX67C_Atlanta flows src=196.174.198.235 dst=61.170.36.53 protocol=tcp sport=50404 dport=5555 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 5555,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=96.73.199.109 1 1660344803.000089912 M34_MX67C_Atlanta flows src=196.174.... | Create a JSON artifact from the message |
<134>Original Address=96.73.199.109 1 1660344803.000089912 M34_MX67C_Atlanta flows src=196.174.198.235 dst=61.170.36.53 protocol=tcp sport=50404 dport=5555 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=96.73.199.109 1 1660344803.000089912 M34_MX67C_Atlanta flows src=196.174.198.235 dst=61.170.36.53 protocol=tcp sport=50404 dport=5555 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 5555
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 50404
protocol: 6
stre... | Explain this syslog message |
<164>Sep 01 2022 04:52:12: %ASA-4-106023: Deny tcp src outside:234.201.121.194/51430 dst dmz-1:173.209.23.164/445 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 445,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Sep 01 2022 04:52:12: %ASA-4-106023: Deny tcp src outside:234.201.121.194/51430 dst dmz-1:173.209.23.164/445 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 01 2022 04:52:12: %ASA-4-106023: Deny tcp src outside:234.201.121.194/51430 dst dmz-1:173.209.23.164/445 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 445
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
s... | Explain this syslog message |
<164>Sep 01 2022 04:52:12: %ASA-4-106023: Deny tcp src outside:79.230.145.68/51430 dst dmz-1:75.83.2.133/445 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 445,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Sep 01 2022 04:52:12: %ASA-4-106023: Deny tcp src outside:79.230.145.68/51430 dst dmz-1:75.83.2.133/445 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 01 2022 04:52:12: %ASA-4-106023: Deny tcp src outside:79.230.145.68/51430 dst dmz-1:75.83.2.133/445 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 445
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
s... | Explain this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.