input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3
values |
|---|---|---|
<164>Sep 01 2022 04:50:56: %ASA-4-106023: Deny tcp src outside:137.255.70.173/46314 dst dmz-1:235.118.73.86/35409 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 35409,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",... | Create a JSON artifact from the message |
<164>Sep 01 2022 04:50:56: %ASA-4-106023: Deny tcp src outside:137.255.70.173/46314 dst dmz-1:235.118.73.86/35409 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 01 2022 04:50:56: %ASA-4-106023: Deny tcp src outside:137.255.70.173/46314 dst dmz-1:235.118.73.86/35409 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 35409
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown... | Explain this syslog message |
<164>Sep 01 2022 04:50:56: %ASA-4-106023: Deny tcp src outside:199.250.111.213/46314 dst dmz-1:126.11.22.213/35409 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 35409,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",... | Create a JSON artifact from the message |
<164>Sep 01 2022 04:50:56: %ASA-4-106023: Deny tcp src outside:199.250.111.213/46314 dst dmz-1:126.11.22.213/35409 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 01 2022 04:50:56: %ASA-4-106023: Deny tcp src outside:199.250.111.213/46314 dst dmz-1:126.11.22.213/35409 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 35409
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown... | Explain this syslog message |
<164>Sep 01 2022 04:51:01: %ASA-4-106023: Deny tcp src outside:220.233.54.222/34955 dst dmz-1:52.56.107.204/23 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Sep 01 2022 04:51:01: %ASA-4-106023: Deny tcp src outside:220.233.54.222/34955 dst dmz-1:52.56.107.204/23 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 01 2022 04:51:01: %ASA-4-106023: Deny tcp src outside:220.233.54.222/34955 dst dmz-1:52.56.107.204/23 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
se... | Explain this syslog message |
<164>Sep 01 2022 04:51:01: %ASA-4-106023: Deny tcp src outside:35.158.84.214/34955 dst dmz-1:152.170.11.155/23 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Sep 01 2022 04:51:01: %ASA-4-106023: Deny tcp src outside:35.158.84.214/34955 dst dmz-1:152.170.11.155/23 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 01 2022 04:51:01: %ASA-4-106023: Deny tcp src outside:35.158.84.214/34955 dst dmz-1:152.170.11.155/23 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
se... | Explain this syslog message |
<164>Sep 01 2022 04:51:42: %ASA-4-106023: Deny tcp src outside:46.198.164.71/30116 dst dmz-1:83.112.128.69/12588 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 12588,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",... | Create a JSON artifact from the message |
<164>Sep 01 2022 04:51:42: %ASA-4-106023: Deny tcp src outside:46.198.164.71/30116 dst dmz-1:83.112.128.69/12588 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 01 2022 04:51:42: %ASA-4-106023: Deny tcp src outside:46.198.164.71/30116 dst dmz-1:83.112.128.69/12588 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 12588
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown... | Explain this syslog message |
<164>Sep 01 2022 04:51:42: %ASA-4-106023: Deny tcp src outside:131.167.98.11/30116 dst dmz-1:118.79.254.213/12588 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 12588,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",... | Create a JSON artifact from the message |
<164>Sep 01 2022 04:51:42: %ASA-4-106023: Deny tcp src outside:131.167.98.11/30116 dst dmz-1:118.79.254.213/12588 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 01 2022 04:51:42: %ASA-4-106023: Deny tcp src outside:131.167.98.11/30116 dst dmz-1:118.79.254.213/12588 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 12588
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown... | Explain this syslog message |
<164>Sep 01 2022 04:52:12: %ASA-4-106023: Deny tcp src outside:122.185.205.113/51430 dst dmz-1:177.99.172.240/445 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 445,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Sep 01 2022 04:52:12: %ASA-4-106023: Deny tcp src outside:122.185.205.113/51430 dst dmz-1:177.99.172.240/445 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 01 2022 04:52:12: %ASA-4-106023: Deny tcp src outside:122.185.205.113/51430 dst dmz-1:177.99.172.240/445 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 445
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
s... | Explain this syslog message |
<164>Sep 01 2022 04:52:12: %ASA-4-106023: Deny tcp src outside:137.40.56.43/51430 dst dmz-1:42.246.49.106/445 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 445,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Sep 01 2022 04:52:12: %ASA-4-106023: Deny tcp src outside:137.40.56.43/51430 dst dmz-1:42.246.49.106/445 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 01 2022 04:52:12: %ASA-4-106023: Deny tcp src outside:137.40.56.43/51430 dst dmz-1:42.246.49.106/445 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 445
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
s... | Explain this syslog message |
<14>Feb 24 16:18:13 DC1-PA3220-1 1,2023/02/24 16:18:13,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:13,184.78.36.127,236.164.66.108,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:13,0,1,58914,1177,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 16... | {
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"serverport": 1177,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"productids": [
20,
0
],
"severitycode": 6,
"sourceinfo": "unknown"... | Create a JSON artifact from the message |
<14>Feb 24 16:18:13 DC1-PA3220-1 1,2023/02/24 16:18:13,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:13,184.78.36.127,236.164.66.108,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:13,0,1,58914,1177,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 16... | Product: PAN NGFW
Vendor: Palo Alto | Identify this syslog message |
<14>Feb 24 16:18:13 DC1-PA3220-1 1,2023/02/24 16:18:13,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:13,184.78.36.127,236.164.66.108,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:13,0,1,58914,1177,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 16... | This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: Geo Block Inbound
senderhost: 10.99.10.30
serverport: 1177
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
productids: [20, 0]
severitycode: 6
sourceinfo: ... | Explain this syslog message |
<14>Feb 24 16:18:13 DC1-PA3220-1 1,2023/02/24 16:18:13,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:13,255.116.254.91,18.213.90.172,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:13,0,1,58914,1177,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 16... | {
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"serverport": 1177,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"productids": [
20,
0
],
"severitycode": 6,
"sourceinfo": "unknown"... | Create a JSON artifact from the message |
<14>Feb 24 16:18:13 DC1-PA3220-1 1,2023/02/24 16:18:13,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:13,255.116.254.91,18.213.90.172,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:13,0,1,58914,1177,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 16... | Product: PAN NGFW
Vendor: Palo Alto | Identify this syslog message |
<14>Feb 24 16:18:13 DC1-PA3220-1 1,2023/02/24 16:18:13,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:13,255.116.254.91,18.213.90.172,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:13,0,1,58914,1177,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 16... | This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: Geo Block Inbound
senderhost: 10.99.10.30
serverport: 1177
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
productids: [20, 0]
severitycode: 6
sourceinfo: ... | Explain this syslog message |
<14>Feb 24 16:18:13 DC1-PA3220-1 1,2023/02/24 16:18:13,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:13,232.214.11.167,202.242.142.116,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:13,0,1,58914,1177,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 ... | {
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"serverport": 1177,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"productids": [
20,
0
],
"severitycode": 6,
"sourceinfo": "unknown"... | Create a JSON artifact from the message |
<14>Feb 24 16:18:13 DC1-PA3220-1 1,2023/02/24 16:18:13,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:13,232.214.11.167,202.242.142.116,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:13,0,1,58914,1177,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 ... | Product: PAN NGFW
Vendor: Palo Alto | Identify this syslog message |
<14>Feb 24 16:18:13 DC1-PA3220-1 1,2023/02/24 16:18:13,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:13,232.214.11.167,202.242.142.116,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:13,0,1,58914,1177,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 ... | This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: Geo Block Inbound
senderhost: 10.99.10.30
serverport: 1177
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
productids: [20, 0]
severitycode: 6
sourceinfo: ... | Explain this syslog message |
<14>Feb 24 16:18:13 DC1-PA3220-1 1,2023/02/24 16:18:13,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:13,106.202.246.73,38.233.168.170,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:13,0,1,58914,1177,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 1... | {
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"serverport": 1177,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"productids": [
20,
0
],
"severitycode": 6,
"sourceinfo": "unknown"... | Create a JSON artifact from the message |
<14>Feb 24 16:18:13 DC1-PA3220-1 1,2023/02/24 16:18:13,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:13,106.202.246.73,38.233.168.170,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:13,0,1,58914,1177,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 1... | Product: PAN NGFW
Vendor: Palo Alto | Identify this syslog message |
<14>Feb 24 16:18:13 DC1-PA3220-1 1,2023/02/24 16:18:13,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:13,106.202.246.73,38.233.168.170,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:13,0,1,58914,1177,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 1... | This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: Geo Block Inbound
senderhost: 10.99.10.30
serverport: 1177
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
productids: [20, 0]
severitycode: 6
sourceinfo: ... | Explain this syslog message |
<14>Feb 24 16:18:34 DC1-PA3220-1 1,2023/02/24 16:18:34,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:34,45.9.79.132,85.227.79.24,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:34,0,1,50216,3488,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 16:18:... | {
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"serverport": 3488,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"productids": [
20,
0
],
"severitycode": 6,
"sourceinfo": "unknown"... | Create a JSON artifact from the message |
<14>Feb 24 16:18:34 DC1-PA3220-1 1,2023/02/24 16:18:34,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:34,45.9.79.132,85.227.79.24,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:34,0,1,50216,3488,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 16:18:... | Product: PAN NGFW
Vendor: Palo Alto | Identify this syslog message |
<14>Feb 24 16:18:34 DC1-PA3220-1 1,2023/02/24 16:18:34,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:34,45.9.79.132,85.227.79.24,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:34,0,1,50216,3488,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 16:18:... | This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: Geo Block Inbound
senderhost: 10.99.10.30
serverport: 3488
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
productids: [20, 0]
severitycode: 6
sourceinfo: ... | Explain this syslog message |
<14>Feb 24 16:18:34 DC1-PA3220-1 1,2023/02/24 16:18:34,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:34,109.29.50.21,49.1.106.193,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:34,0,1,50216,3488,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 16:18... | {
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"serverport": 3488,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"productids": [
20,
0
],
"severitycode": 6,
"sourceinfo": "unknown"... | Create a JSON artifact from the message |
<14>Feb 24 16:18:34 DC1-PA3220-1 1,2023/02/24 16:18:34,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:34,109.29.50.21,49.1.106.193,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:34,0,1,50216,3488,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 16:18... | Product: PAN NGFW
Vendor: Palo Alto | Identify this syslog message |
<14>Feb 24 16:18:34 DC1-PA3220-1 1,2023/02/24 16:18:34,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:34,109.29.50.21,49.1.106.193,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:34,0,1,50216,3488,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 16:18... | This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: Geo Block Inbound
senderhost: 10.99.10.30
serverport: 3488
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
productids: [20, 0]
severitycode: 6
sourceinfo: ... | Explain this syslog message |
<14>Feb 24 16:18:34 DC1-PA3220-1 1,2023/02/24 16:18:34,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:34,143.118.81.178,59.248.229.93,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:34,0,1,50216,3488,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 16... | {
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"serverport": 3488,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"productids": [
20,
0
],
"severitycode": 6,
"sourceinfo": "unknown"... | Create a JSON artifact from the message |
<14>Feb 24 16:18:34 DC1-PA3220-1 1,2023/02/24 16:18:34,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:34,143.118.81.178,59.248.229.93,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:34,0,1,50216,3488,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 16... | Product: PAN NGFW
Vendor: Palo Alto | Identify this syslog message |
<14>Feb 24 16:18:34 DC1-PA3220-1 1,2023/02/24 16:18:34,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:34,143.118.81.178,59.248.229.93,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:34,0,1,50216,3488,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 16... | This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: Geo Block Inbound
senderhost: 10.99.10.30
serverport: 3488
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
productids: [20, 0]
severitycode: 6
sourceinfo: ... | Explain this syslog message |
<14>Feb 24 16:18:34 DC1-PA3220-1 1,2023/02/24 16:18:34,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:34,130.27.235.63,11.19.83.85,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:34,0,1,50216,3488,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 16:18... | {
"rulename": "Geo Block Inbound",
"senderhost": "10.99.10.30",
"serverport": 3488,
"severitylabel": "informational",
"tags": [
"rfc3164",
"pan_firewall",
"traffic_drop"
],
"productids": [
20,
0
],
"severitycode": 6,
"sourceinfo": "unknown"... | Create a JSON artifact from the message |
<14>Feb 24 16:18:34 DC1-PA3220-1 1,2023/02/24 16:18:34,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:34,130.27.235.63,11.19.83.85,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:34,0,1,50216,3488,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 16:18... | Product: PAN NGFW
Vendor: Palo Alto | Identify this syslog message |
<14>Feb 24 16:18:34 DC1-PA3220-1 1,2023/02/24 16:18:34,016201032964,TRAFFIC,drop,2560,2023/02/24 16:18:34,130.27.235.63,11.19.83.85,0.0.0.0,0.0.0.0,Geo Block Inbound,,,not-applicable,vsys1,Untrust,Untrust,ethernet1/2,,Witfoo Log Forward Only,2023/02/24 16:18:34,0,1,50216,3488,0,0,0x0,tcp,deny,60,60,0,1,2023/02/24 16:18... | This is a syslog message from a product called PAN NGFW by Palo Alto. The following fields were extracted from the message:
rulename: Geo Block Inbound
senderhost: 10.99.10.30
serverport: 3488
severitylabel: informational
tags: ['rfc3164', 'pan_firewall', 'traffic_drop']
productids: [20, 0]
severitycode: 6
sourceinfo: ... | Explain this syslog message |
<164>Jan 15 2023 11:34:40: %ASA-4-106023: Deny tcp src outside:221.171.192.129/43061 dst dmz-1:237.63.57.232/8088 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8088,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Jan 15 2023 11:34:40: %ASA-4-106023: Deny tcp src outside:221.171.192.129/43061 dst dmz-1:237.63.57.232/8088 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Jan 15 2023 11:34:40: %ASA-4-106023: Deny tcp src outside:221.171.192.129/43061 dst dmz-1:237.63.57.232/8088 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8088
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
... | Explain this syslog message |
<164>Jan 15 2023 11:34:40: %ASA-4-106023: Deny tcp src outside:173.249.34.189/43061 dst dmz-1:171.142.250.104/8088 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8088,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Jan 15 2023 11:34:40: %ASA-4-106023: Deny tcp src outside:173.249.34.189/43061 dst dmz-1:171.142.250.104/8088 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Jan 15 2023 11:34:40: %ASA-4-106023: Deny tcp src outside:173.249.34.189/43061 dst dmz-1:171.142.250.104/8088 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8088
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
... | Explain this syslog message |
<164>Jan 15 2023 11:34:40: %ASA-4-106023: Deny tcp src outside:164.61.31.167/43061 dst dmz-1:172.173.68.74/8088 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8088,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Jan 15 2023 11:34:40: %ASA-4-106023: Deny tcp src outside:164.61.31.167/43061 dst dmz-1:172.173.68.74/8088 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Jan 15 2023 11:34:40: %ASA-4-106023: Deny tcp src outside:164.61.31.167/43061 dst dmz-1:172.173.68.74/8088 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8088
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
... | Explain this syslog message |
<164>Jan 15 2023 11:34:40: %ASA-4-106023: Deny tcp src outside:143.222.79.52/43061 dst dmz-1:226.137.118.101/8088 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 8088,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Jan 15 2023 11:34:40: %ASA-4-106023: Deny tcp src outside:143.222.79.52/43061 dst dmz-1:226.137.118.101/8088 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Jan 15 2023 11:34:40: %ASA-4-106023: Deny tcp src outside:143.222.79.52/43061 dst dmz-1:226.137.118.101/8088 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 8088
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096830.232683052 NORDC_MX400_1 flows src=31.120.20.13 dst=159.175.231.116 protocol=tcp sport=5572 dport=25 pattern: 1 dst 159.175.231.116 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096830.232683052 NORDC_MX400_1 flows src=31.120.20.13 d... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096830.232683052 NORDC_MX400_1 flows src=31.120.20.13 dst=159.175.231.116 protocol=tcp sport=5572 dport=25 pattern: 1 dst 159.175.231.116 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096830.232683052 NORDC_MX400_1 flows src=31.120.20.13 dst=159.175.231.116 protocol=tcp sport=5572 dport=25 pattern: 1 dst 159.175.231.116 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 5572
protocol: 6
streamN... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096830.232683052 NORDC_MX400_1 flows src=150.42.157.236 dst=190.142.89.97 protocol=tcp sport=5572 dport=25 pattern: 1 dst 190.142.89.97 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096830.232683052 NORDC_MX400_1 flows src=150.42.157.236... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096830.232683052 NORDC_MX400_1 flows src=150.42.157.236 dst=190.142.89.97 protocol=tcp sport=5572 dport=25 pattern: 1 dst 190.142.89.97 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096830.232683052 NORDC_MX400_1 flows src=150.42.157.236 dst=190.142.89.97 protocol=tcp sport=5572 dport=25 pattern: 1 dst 190.142.89.97 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 5572
protocol: 6
streamN... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.633307006 NORDC_MX400_1 flows src=54.63.77.172 dst=72.104.26.151 protocol=tcp sport=6197 dport=25 pattern: 1 dst 72.104.26.151 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096829.633307006 NORDC_MX400_1 flows src=54.63.77.172 d... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096829.633307006 NORDC_MX400_1 flows src=54.63.77.172 dst=72.104.26.151 protocol=tcp sport=6197 dport=25 pattern: 1 dst 72.104.26.151 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.633307006 NORDC_MX400_1 flows src=54.63.77.172 dst=72.104.26.151 protocol=tcp sport=6197 dport=25 pattern: 1 dst 72.104.26.151 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6197
protocol: 6
streamN... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.633307006 NORDC_MX400_1 flows src=15.121.13.13 dst=181.64.29.106 protocol=tcp sport=6197 dport=25 pattern: 1 dst 181.64.29.106 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096829.633307006 NORDC_MX400_1 flows src=15.121.13.13 d... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096829.633307006 NORDC_MX400_1 flows src=15.121.13.13 dst=181.64.29.106 protocol=tcp sport=6197 dport=25 pattern: 1 dst 181.64.29.106 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.633307006 NORDC_MX400_1 flows src=15.121.13.13 dst=181.64.29.106 protocol=tcp sport=6197 dport=25 pattern: 1 dst 181.64.29.106 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6197
protocol: 6
streamN... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.732315188 NORDC_MX400_1 flows src=144.15.229.223 dst=93.182.159.239 protocol=tcp sport=49696 dport=25 pattern: 1 dst 93.182.159.239 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096829.732315188 NORDC_MX400_1 flows src=144.15.229.223... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096829.732315188 NORDC_MX400_1 flows src=144.15.229.223 dst=93.182.159.239 protocol=tcp sport=49696 dport=25 pattern: 1 dst 93.182.159.239 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.732315188 NORDC_MX400_1 flows src=144.15.229.223 dst=93.182.159.239 protocol=tcp sport=49696 dport=25 pattern: 1 dst 93.182.159.239 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 49696
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.732315188 NORDC_MX400_1 flows src=29.35.56.102 dst=171.56.67.129 protocol=tcp sport=49696 dport=25 pattern: 1 dst 171.56.67.129 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096829.732315188 NORDC_MX400_1 flows src=29.35.56.102 d... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096829.732315188 NORDC_MX400_1 flows src=29.35.56.102 dst=171.56.67.129 protocol=tcp sport=49696 dport=25 pattern: 1 dst 171.56.67.129 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.732315188 NORDC_MX400_1 flows src=29.35.56.102 dst=171.56.67.129 protocol=tcp sport=49696 dport=25 pattern: 1 dst 171.56.67.129 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 49696
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.508312435 NORDC_MX400_1 flows src=92.108.225.20 dst=112.160.39.244 protocol=tcp sport=10392 dport=25 pattern: 1 dst 112.160.39.244 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096829.508312435 NORDC_MX400_1 flows src=92.108.225.20 ... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096829.508312435 NORDC_MX400_1 flows src=92.108.225.20 dst=112.160.39.244 protocol=tcp sport=10392 dport=25 pattern: 1 dst 112.160.39.244 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.508312435 NORDC_MX400_1 flows src=92.108.225.20 dst=112.160.39.244 protocol=tcp sport=10392 dport=25 pattern: 1 dst 112.160.39.244 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 10392
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.508312435 NORDC_MX400_1 flows src=160.219.214.178 dst=13.83.77.168 protocol=tcp sport=10392 dport=25 pattern: 1 dst 13.83.77.168 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096829.508312435 NORDC_MX400_1 flows src=160.219.214.17... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096829.508312435 NORDC_MX400_1 flows src=160.219.214.178 dst=13.83.77.168 protocol=tcp sport=10392 dport=25 pattern: 1 dst 13.83.77.168 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.508312435 NORDC_MX400_1 flows src=160.219.214.178 dst=13.83.77.168 protocol=tcp sport=10392 dport=25 pattern: 1 dst 13.83.77.168 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 10392
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.940902834 NORDC_MX400_1 flows src=186.35.146.38 dst=58.248.199.164 protocol=tcp sport=24065 dport=25 pattern: 1 dst 58.248.199.164 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096829.940902834 NORDC_MX400_1 flows src=186.35.146.38 ... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096829.940902834 NORDC_MX400_1 flows src=186.35.146.38 dst=58.248.199.164 protocol=tcp sport=24065 dport=25 pattern: 1 dst 58.248.199.164 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.940902834 NORDC_MX400_1 flows src=186.35.146.38 dst=58.248.199.164 protocol=tcp sport=24065 dport=25 pattern: 1 dst 58.248.199.164 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 24065
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.940902834 NORDC_MX400_1 flows src=249.111.119.155 dst=54.225.27.255 protocol=tcp sport=24065 dport=25 pattern: 1 dst 54.225.27.255 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096829.940902834 NORDC_MX400_1 flows src=249.111.119.15... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096829.940902834 NORDC_MX400_1 flows src=249.111.119.155 dst=54.225.27.255 protocol=tcp sport=24065 dport=25 pattern: 1 dst 54.225.27.255 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.940902834 NORDC_MX400_1 flows src=249.111.119.155 dst=54.225.27.255 protocol=tcp sport=24065 dport=25 pattern: 1 dst 54.225.27.255 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 24065
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.961382154 NORDC_MX400_1 flows src=104.251.99.107 dst=9.48.20.244 protocol=tcp sport=33504 dport=25 pattern: 1 dst 9.48.20.244 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096829.961382154 NORDC_MX400_1 flows src=104.251.99.107... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096829.961382154 NORDC_MX400_1 flows src=104.251.99.107 dst=9.48.20.244 protocol=tcp sport=33504 dport=25 pattern: 1 dst 9.48.20.244 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.961382154 NORDC_MX400_1 flows src=104.251.99.107 dst=9.48.20.244 protocol=tcp sport=33504 dport=25 pattern: 1 dst 9.48.20.244 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 33504
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.961382154 NORDC_MX400_1 flows src=126.124.0.128 dst=84.50.93.219 protocol=tcp sport=33504 dport=25 pattern: 1 dst 84.50.93.219 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096829.961382154 NORDC_MX400_1 flows src=126.124.0.128 ... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096829.961382154 NORDC_MX400_1 flows src=126.124.0.128 dst=84.50.93.219 protocol=tcp sport=33504 dport=25 pattern: 1 dst 84.50.93.219 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.961382154 NORDC_MX400_1 flows src=126.124.0.128 dst=84.50.93.219 protocol=tcp sport=33504 dport=25 pattern: 1 dst 84.50.93.219 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 33504
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096830.468415765 NORDC_MX400_1 flows src=104.229.125.221 dst=91.62.247.106 protocol=tcp sport=1889 dport=25 pattern: 1 dst 91.62.247.106 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096830.468415765 NORDC_MX400_1 flows src=104.229.125.22... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096830.468415765 NORDC_MX400_1 flows src=104.229.125.221 dst=91.62.247.106 protocol=tcp sport=1889 dport=25 pattern: 1 dst 91.62.247.106 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096830.468415765 NORDC_MX400_1 flows src=104.229.125.221 dst=91.62.247.106 protocol=tcp sport=1889 dport=25 pattern: 1 dst 91.62.247.106 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 1889
protocol: 6
streamN... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096830.468415765 NORDC_MX400_1 flows src=153.185.44.105 dst=244.185.55.125 protocol=tcp sport=1889 dport=25 pattern: 1 dst 244.185.55.125 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096830.468415765 NORDC_MX400_1 flows src=153.185.44.105... | Create a JSON artifact from the message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.