input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<134>Original Address=192.168.2.253 1 1661096830.468415765 NORDC_MX400_1 flows src=153.185.44.105 dst=244.185.55.125 protocol=tcp sport=1889 dport=25 pattern: 1 dst 244.185.55.125
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661096830.468415765 NORDC_MX400_1 flows src=153.185.44.105 dst=244.185.55.125 protocol=tcp sport=1889 dport=25 pattern: 1 dst 244.185.55.125
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 1889 protocol: 6 streamN...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1661096830.141780520 NORDC_MX400_1 flows src=162.77.89.54 dst=73.116.104.39 protocol=tcp sport=6197 dport=25 pattern: 1 dst 73.116.104.39
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1661096830.141780520 NORDC_MX400_1 flows src=162.77.89.54 d...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1661096830.141780520 NORDC_MX400_1 flows src=162.77.89.54 dst=73.116.104.39 protocol=tcp sport=6197 dport=25 pattern: 1 dst 73.116.104.39
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661096830.141780520 NORDC_MX400_1 flows src=162.77.89.54 dst=73.116.104.39 protocol=tcp sport=6197 dport=25 pattern: 1 dst 73.116.104.39
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 6197 protocol: 6 streamN...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1661096830.141780520 NORDC_MX400_1 flows src=18.1.212.203 dst=137.170.245.80 protocol=tcp sport=6197 dport=25 pattern: 1 dst 137.170.245.80
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1661096830.141780520 NORDC_MX400_1 flows src=18.1.212.203 d...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1661096830.141780520 NORDC_MX400_1 flows src=18.1.212.203 dst=137.170.245.80 protocol=tcp sport=6197 dport=25 pattern: 1 dst 137.170.245.80
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661096830.141780520 NORDC_MX400_1 flows src=18.1.212.203 dst=137.170.245.80 protocol=tcp sport=6197 dport=25 pattern: 1 dst 137.170.245.80
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 6197 protocol: 6 streamN...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1661096830.232683052 NORDC_MX400_1 flows src=24.92.170.155 dst=51.9.176.42 protocol=tcp sport=5572 dport=25 pattern: 1 dst 51.9.176.42
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1661096830.232683052 NORDC_MX400_1 flows src=24.92.170.155 ...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1661096830.232683052 NORDC_MX400_1 flows src=24.92.170.155 dst=51.9.176.42 protocol=tcp sport=5572 dport=25 pattern: 1 dst 51.9.176.42
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661096830.232683052 NORDC_MX400_1 flows src=24.92.170.155 dst=51.9.176.42 protocol=tcp sport=5572 dport=25 pattern: 1 dst 51.9.176.42
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 5572 protocol: 6 streamN...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1661096830.232683052 NORDC_MX400_1 flows src=71.137.67.69 dst=55.22.5.48 protocol=tcp sport=5572 dport=25 pattern: 1 dst 55.22.5.48
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1661096830.232683052 NORDC_MX400_1 flows src=71.137.67.69 d...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1661096830.232683052 NORDC_MX400_1 flows src=71.137.67.69 dst=55.22.5.48 protocol=tcp sport=5572 dport=25 pattern: 1 dst 55.22.5.48
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661096830.232683052 NORDC_MX400_1 flows src=71.137.67.69 dst=55.22.5.48 protocol=tcp sport=5572 dport=25 pattern: 1 dst 55.22.5.48
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 5572 protocol: 6 streamN...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1661096829.084040385 NORDC_MX400_1 flows src=224.167.60.163 dst=101.94.89.114 protocol=tcp sport=62176 dport=25 pattern: 1 dst 101.94.89.114
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1661096829.084040385 NORDC_MX400_1 flows src=224.167.60.163...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1661096829.084040385 NORDC_MX400_1 flows src=224.167.60.163 dst=101.94.89.114 protocol=tcp sport=62176 dport=25 pattern: 1 dst 101.94.89.114
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661096829.084040385 NORDC_MX400_1 flows src=224.167.60.163 dst=101.94.89.114 protocol=tcp sport=62176 dport=25 pattern: 1 dst 101.94.89.114
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 62176 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1661096829.084040385 NORDC_MX400_1 flows src=248.132.7.166 dst=186.216.79.144 protocol=tcp sport=62176 dport=25 pattern: 1 dst 186.216.79.144
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1661096829.084040385 NORDC_MX400_1 flows src=248.132.7.166 ...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1661096829.084040385 NORDC_MX400_1 flows src=248.132.7.166 dst=186.216.79.144 protocol=tcp sport=62176 dport=25 pattern: 1 dst 186.216.79.144
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661096829.084040385 NORDC_MX400_1 flows src=248.132.7.166 dst=186.216.79.144 protocol=tcp sport=62176 dport=25 pattern: 1 dst 186.216.79.144
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 62176 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1661096829.519586685 NORDC_MX400_1 flows src=97.226.115.207 dst=46.253.141.194 protocol=tcp sport=54337 dport=25 pattern: 1 dst 46.253.141.194
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1661096829.519586685 NORDC_MX400_1 flows src=97.226.115.207...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1661096829.519586685 NORDC_MX400_1 flows src=97.226.115.207 dst=46.253.141.194 protocol=tcp sport=54337 dport=25 pattern: 1 dst 46.253.141.194
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661096829.519586685 NORDC_MX400_1 flows src=97.226.115.207 dst=46.253.141.194 protocol=tcp sport=54337 dport=25 pattern: 1 dst 46.253.141.194
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 54337 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1661096829.519586685 NORDC_MX400_1 flows src=246.71.120.101 dst=85.132.243.3 protocol=tcp sport=54337 dport=25 pattern: 1 dst 85.132.243.3
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1661096829.519586685 NORDC_MX400_1 flows src=246.71.120.101...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1661096829.519586685 NORDC_MX400_1 flows src=246.71.120.101 dst=85.132.243.3 protocol=tcp sport=54337 dport=25 pattern: 1 dst 85.132.243.3
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661096829.519586685 NORDC_MX400_1 flows src=246.71.120.101 dst=85.132.243.3 protocol=tcp sport=54337 dport=25 pattern: 1 dst 85.132.243.3
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 54337 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1661096829.601296908 NORDC_MX400_1 flows src=84.75.103.34 dst=177.95.168.183 protocol=tcp sport=27808 dport=25 pattern: 1 dst 177.95.168.183
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1661096829.601296908 NORDC_MX400_1 flows src=84.75.103.34 d...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1661096829.601296908 NORDC_MX400_1 flows src=84.75.103.34 dst=177.95.168.183 protocol=tcp sport=27808 dport=25 pattern: 1 dst 177.95.168.183
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661096829.601296908 NORDC_MX400_1 flows src=84.75.103.34 dst=177.95.168.183 protocol=tcp sport=27808 dport=25 pattern: 1 dst 177.95.168.183
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 27808 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1661096829.601296908 NORDC_MX400_1 flows src=118.140.4.111 dst=245.155.241.75 protocol=tcp sport=27808 dport=25 pattern: 1 dst 245.155.241.75
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1661096829.601296908 NORDC_MX400_1 flows src=118.140.4.111 ...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1661096829.601296908 NORDC_MX400_1 flows src=118.140.4.111 dst=245.155.241.75 protocol=tcp sport=27808 dport=25 pattern: 1 dst 245.155.241.75
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661096829.601296908 NORDC_MX400_1 flows src=118.140.4.111 dst=245.155.241.75 protocol=tcp sport=27808 dport=25 pattern: 1 dst 245.155.241.75
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 27808 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1661096829.997370779 NORDC_MX400_1 flows src=81.61.132.93 dst=199.120.82.218 protocol=tcp sport=53600 dport=25 pattern: 1 dst 199.120.82.218
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1661096829.997370779 NORDC_MX400_1 flows src=81.61.132.93 d...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1661096829.997370779 NORDC_MX400_1 flows src=81.61.132.93 dst=199.120.82.218 protocol=tcp sport=53600 dport=25 pattern: 1 dst 199.120.82.218
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661096829.997370779 NORDC_MX400_1 flows src=81.61.132.93 dst=199.120.82.218 protocol=tcp sport=53600 dport=25 pattern: 1 dst 199.120.82.218
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 53600 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1661096829.997370779 NORDC_MX400_1 flows src=206.241.94.91 dst=50.13.162.40 protocol=tcp sport=53600 dport=25 pattern: 1 dst 50.13.162.40
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1661096829.997370779 NORDC_MX400_1 flows src=206.241.94.91 ...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1661096829.997370779 NORDC_MX400_1 flows src=206.241.94.91 dst=50.13.162.40 protocol=tcp sport=53600 dport=25 pattern: 1 dst 50.13.162.40
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661096829.997370779 NORDC_MX400_1 flows src=206.241.94.91 dst=50.13.162.40 protocol=tcp sport=53600 dport=25 pattern: 1 dst 50.13.162.40
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 53600 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1661096829.879609832 NORDC_MX400_1 flows src=35.236.139.76 dst=51.87.94.126 protocol=tcp sport=40807 dport=25 pattern: 1 dst 51.87.94.126
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1661096829.879609832 NORDC_MX400_1 flows src=35.236.139.76 ...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1661096829.879609832 NORDC_MX400_1 flows src=35.236.139.76 dst=51.87.94.126 protocol=tcp sport=40807 dport=25 pattern: 1 dst 51.87.94.126
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661096829.879609832 NORDC_MX400_1 flows src=35.236.139.76 dst=51.87.94.126 protocol=tcp sport=40807 dport=25 pattern: 1 dst 51.87.94.126
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 40807 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1661096829.879609832 NORDC_MX400_1 flows src=86.168.176.140 dst=183.215.236.4 protocol=tcp sport=40807 dport=25 pattern: 1 dst 183.215.236.4
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1661096829.879609832 NORDC_MX400_1 flows src=86.168.176.140...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1661096829.879609832 NORDC_MX400_1 flows src=86.168.176.140 dst=183.215.236.4 protocol=tcp sport=40807 dport=25 pattern: 1 dst 183.215.236.4
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661096829.879609832 NORDC_MX400_1 flows src=86.168.176.140 dst=183.215.236.4 protocol=tcp sport=40807 dport=25 pattern: 1 dst 183.215.236.4
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 40807 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1661096830.918310053 NORDC_MX400_1 flows src=212.214.53.89 dst=184.187.184.23 protocol=udp sport=4104 dport=4104 pattern: 1 dst 184.187.184.23
{ "senderhost": "192.168.2.250", "serverport": 4104, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1661096830.918310053 NORDC_MX400_1 flows src=212.214.53.8...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1661096830.918310053 NORDC_MX400_1 flows src=212.214.53.89 dst=184.187.184.23 protocol=udp sport=4104 dport=4104 pattern: 1 dst 184.187.184.23
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661096830.918310053 NORDC_MX400_1 flows src=212.214.53.89 dst=184.187.184.23 protocol=udp sport=4104 dport=4104 pattern: 1 dst 184.187.184.23
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 4104 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 4104 protocol: 17 stre...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1661096830.918310053 NORDC_MX400_1 flows src=190.230.220.27 dst=195.202.61.2 protocol=udp sport=4104 dport=4104 pattern: 1 dst 195.202.61.2
{ "senderhost": "192.168.2.250", "serverport": 4104, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1661096830.918310053 NORDC_MX400_1 flows src=190.230.220....
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1661096830.918310053 NORDC_MX400_1 flows src=190.230.220.27 dst=195.202.61.2 protocol=udp sport=4104 dport=4104 pattern: 1 dst 195.202.61.2
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1661096830.918310053 NORDC_MX400_1 flows src=190.230.220.27 dst=195.202.61.2 protocol=udp sport=4104 dport=4104 pattern: 1 dst 195.202.61.2
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 4104 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 4104 protocol: 17 stre...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=74.60.134.91 dst=161.154.69.196 protocol=tcp sport=27316 dport=25 pattern: 1 dst 161.154.69.196
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=74.60.134.91 d...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=74.60.134.91 dst=161.154.69.196 protocol=tcp sport=27316 dport=25 pattern: 1 dst 161.154.69.196
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=74.60.134.91 dst=161.154.69.196 protocol=tcp sport=27316 dport=25 pattern: 1 dst 161.154.69.196
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 27316 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=226.147.37.130 dst=79.2.49.235 protocol=tcp sport=27316 dport=25 pattern: 1 dst 79.2.49.235
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=226.147.37.130...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=226.147.37.130 dst=79.2.49.235 protocol=tcp sport=27316 dport=25 pattern: 1 dst 79.2.49.235
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=226.147.37.130 dst=79.2.49.235 protocol=tcp sport=27316 dport=25 pattern: 1 dst 79.2.49.235
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 27316 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1657178921.042876082 NORDC_MX400_1 flows src=142.50.36.161 dst=182.32.77.4 protocol=tcp sport=33750 dport=25 pattern: 1 dst 182.32.77.4
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1657178921.042876082 NORDC_MX400_1 flows src=142.50.36.161 ...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1657178921.042876082 NORDC_MX400_1 flows src=142.50.36.161 dst=182.32.77.4 protocol=tcp sport=33750 dport=25 pattern: 1 dst 182.32.77.4
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1657178921.042876082 NORDC_MX400_1 flows src=142.50.36.161 dst=182.32.77.4 protocol=tcp sport=33750 dport=25 pattern: 1 dst 182.32.77.4
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 33750 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1657178921.042876082 NORDC_MX400_1 flows src=141.159.198.204 dst=236.56.253.106 protocol=tcp sport=33750 dport=25 pattern: 1 dst 236.56.253.106
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1657178921.042876082 NORDC_MX400_1 flows src=141.159.198.20...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1657178921.042876082 NORDC_MX400_1 flows src=141.159.198.204 dst=236.56.253.106 protocol=tcp sport=33750 dport=25 pattern: 1 dst 236.56.253.106
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1657178921.042876082 NORDC_MX400_1 flows src=141.159.198.204 dst=236.56.253.106 protocol=tcp sport=33750 dport=25 pattern: 1 dst 236.56.253.106
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 33750 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1657178921.243297544 NORDC_MX400_1 flows src=220.5.153.113 dst=67.231.138.115 protocol=tcp sport=32993 dport=25 pattern: 1 dst 67.231.138.115
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1657178921.243297544 NORDC_MX400_1 flows src=220.5.153.113 ...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1657178921.243297544 NORDC_MX400_1 flows src=220.5.153.113 dst=67.231.138.115 protocol=tcp sport=32993 dport=25 pattern: 1 dst 67.231.138.115
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1657178921.243297544 NORDC_MX400_1 flows src=220.5.153.113 dst=67.231.138.115 protocol=tcp sport=32993 dport=25 pattern: 1 dst 67.231.138.115
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 32993 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1657178921.243297544 NORDC_MX400_1 flows src=96.13.45.50 dst=53.201.196.172 protocol=tcp sport=32993 dport=25 pattern: 1 dst 53.201.196.172
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1657178921.243297544 NORDC_MX400_1 flows src=96.13.45.50 ds...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1657178921.243297544 NORDC_MX400_1 flows src=96.13.45.50 dst=53.201.196.172 protocol=tcp sport=32993 dport=25 pattern: 1 dst 53.201.196.172
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1657178921.243297544 NORDC_MX400_1 flows src=96.13.45.50 dst=53.201.196.172 protocol=tcp sport=32993 dport=25 pattern: 1 dst 53.201.196.172
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 32993 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=173.152.176.148 dst=56.163.190.40 protocol=tcp sport=27316 dport=25 pattern: 1 dst 56.163.190.40
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=173.152.176.14...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=173.152.176.148 dst=56.163.190.40 protocol=tcp sport=27316 dport=25 pattern: 1 dst 56.163.190.40
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=173.152.176.148 dst=56.163.190.40 protocol=tcp sport=27316 dport=25 pattern: 1 dst 56.163.190.40
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 27316 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=232.186.101.247 dst=56.13.184.85 protocol=tcp sport=27316 dport=25 pattern: 1 dst 56.13.184.85
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=232.186.101.24...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=232.186.101.247 dst=56.13.184.85 protocol=tcp sport=27316 dport=25 pattern: 1 dst 56.13.184.85
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=232.186.101.247 dst=56.13.184.85 protocol=tcp sport=27316 dport=25 pattern: 1 dst 56.13.184.85
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 27316 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1657178920.538141736 NORDC_MX400_1 flows src=246.73.147.196 dst=175.149.151.112 protocol=tcp sport=53089 dport=25 pattern: 1 dst 175.149.151.112
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1657178920.538141736 NORDC_MX400_1 flows src=246.73.147.196...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1657178920.538141736 NORDC_MX400_1 flows src=246.73.147.196 dst=175.149.151.112 protocol=tcp sport=53089 dport=25 pattern: 1 dst 175.149.151.112
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1657178920.538141736 NORDC_MX400_1 flows src=246.73.147.196 dst=175.149.151.112 protocol=tcp sport=53089 dport=25 pattern: 1 dst 175.149.151.112
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 53089 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1657178920.538141736 NORDC_MX400_1 flows src=159.146.142.71 dst=17.6.107.205 protocol=tcp sport=53089 dport=25 pattern: 1 dst 17.6.107.205
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1657178920.538141736 NORDC_MX400_1 flows src=159.146.142.71...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1657178920.538141736 NORDC_MX400_1 flows src=159.146.142.71 dst=17.6.107.205 protocol=tcp sport=53089 dport=25 pattern: 1 dst 17.6.107.205
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1657178920.538141736 NORDC_MX400_1 flows src=159.146.142.71 dst=17.6.107.205 protocol=tcp sport=53089 dport=25 pattern: 1 dst 17.6.107.205
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 53089 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=240.72.198.90 dst=163.26.75.177 protocol=tcp sport=54280 dport=81 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 81, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=240.72.198.90 ...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=240.72.198.90 dst=163.26.75.177 protocol=tcp sport=54280 dport=81 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=240.72.198.90 dst=163.26.75.177 protocol=tcp sport=54280 dport=81 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 81 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 54280 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=169.234.225.158 dst=217.189.85.161 protocol=tcp sport=54280 dport=81 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 81, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=169.234.225.15...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=169.234.225.158 dst=217.189.85.161 protocol=tcp sport=54280 dport=81 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=169.234.225.158 dst=217.189.85.161 protocol=tcp sport=54280 dport=81 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 81 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 54280 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=110.199.160.209 dst=112.249.90.88 protocol=tcp sport=54280 dport=81 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 81, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=110.199.160.20...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=110.199.160.209 dst=112.249.90.88 protocol=tcp sport=54280 dport=81 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=110.199.160.209 dst=112.249.90.88 protocol=tcp sport=54280 dport=81 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 81 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 54280 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=93.187.129.186 dst=10.44.36.46 protocol=tcp sport=54280 dport=81 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 81, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=93.187.129.186...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=93.187.129.186 dst=10.44.36.46 protocol=tcp sport=54280 dport=81 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=93.187.129.186 dst=10.44.36.46 protocol=tcp sport=54280 dport=81 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 81 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 54280 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655152365.212890085 NORDC_MX400_1 flows src=101.60.99.48 dst=17.73.33.129 protocol=tcp sport=46288 dport=3817 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 3817, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655152365.212890085 NORDC_MX400_1 flows src=101.60.99.48...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655152365.212890085 NORDC_MX400_1 flows src=101.60.99.48 dst=17.73.33.129 protocol=tcp sport=46288 dport=3817 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655152365.212890085 NORDC_MX400_1 flows src=101.60.99.48 dst=17.73.33.129 protocol=tcp sport=46288 dport=3817 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 3817 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 46288 protocol: 6 stre...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655152365.212890085 NORDC_MX400_1 flows src=24.156.165.54 dst=131.192.183.255 protocol=tcp sport=46288 dport=3817 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 3817, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655152365.212890085 NORDC_MX400_1 flows src=24.156.165.5...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655152365.212890085 NORDC_MX400_1 flows src=24.156.165.54 dst=131.192.183.255 protocol=tcp sport=46288 dport=3817 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1655152365.212890085 NORDC_MX400_1 flows src=24.156.165.54 dst=131.192.183.255 protocol=tcp sport=46288 dport=3817 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 3817 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 46288 protocol: 6 stre...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1655152365.212890085 NORDC_MX400_1 flows src=93.121.34.91 dst=200.175.219.14 protocol=tcp sport=46288 dport=3817 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 3817, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1655152365.212890085 NORDC_MX400_1 flows src=93.121.34.91...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1655152365.212890085 NORDC_MX400_1 flows src=93.121.34.91 dst=200.175.219.14 protocol=tcp sport=46288 dport=3817 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message