input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3
values |
|---|---|---|
<134>Original Address=192.168.2.253 1 1661096830.468415765 NORDC_MX400_1 flows src=153.185.44.105 dst=244.185.55.125 protocol=tcp sport=1889 dport=25 pattern: 1 dst 244.185.55.125 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096830.468415765 NORDC_MX400_1 flows src=153.185.44.105 dst=244.185.55.125 protocol=tcp sport=1889 dport=25 pattern: 1 dst 244.185.55.125 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 1889
protocol: 6
streamN... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096830.141780520 NORDC_MX400_1 flows src=162.77.89.54 dst=73.116.104.39 protocol=tcp sport=6197 dport=25 pattern: 1 dst 73.116.104.39 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096830.141780520 NORDC_MX400_1 flows src=162.77.89.54 d... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096830.141780520 NORDC_MX400_1 flows src=162.77.89.54 dst=73.116.104.39 protocol=tcp sport=6197 dport=25 pattern: 1 dst 73.116.104.39 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096830.141780520 NORDC_MX400_1 flows src=162.77.89.54 dst=73.116.104.39 protocol=tcp sport=6197 dport=25 pattern: 1 dst 73.116.104.39 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6197
protocol: 6
streamN... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096830.141780520 NORDC_MX400_1 flows src=18.1.212.203 dst=137.170.245.80 protocol=tcp sport=6197 dport=25 pattern: 1 dst 137.170.245.80 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096830.141780520 NORDC_MX400_1 flows src=18.1.212.203 d... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096830.141780520 NORDC_MX400_1 flows src=18.1.212.203 dst=137.170.245.80 protocol=tcp sport=6197 dport=25 pattern: 1 dst 137.170.245.80 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096830.141780520 NORDC_MX400_1 flows src=18.1.212.203 dst=137.170.245.80 protocol=tcp sport=6197 dport=25 pattern: 1 dst 137.170.245.80 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6197
protocol: 6
streamN... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096830.232683052 NORDC_MX400_1 flows src=24.92.170.155 dst=51.9.176.42 protocol=tcp sport=5572 dport=25 pattern: 1 dst 51.9.176.42 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096830.232683052 NORDC_MX400_1 flows src=24.92.170.155 ... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096830.232683052 NORDC_MX400_1 flows src=24.92.170.155 dst=51.9.176.42 protocol=tcp sport=5572 dport=25 pattern: 1 dst 51.9.176.42 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096830.232683052 NORDC_MX400_1 flows src=24.92.170.155 dst=51.9.176.42 protocol=tcp sport=5572 dport=25 pattern: 1 dst 51.9.176.42 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 5572
protocol: 6
streamN... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096830.232683052 NORDC_MX400_1 flows src=71.137.67.69 dst=55.22.5.48 protocol=tcp sport=5572 dport=25 pattern: 1 dst 55.22.5.48 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096830.232683052 NORDC_MX400_1 flows src=71.137.67.69 d... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096830.232683052 NORDC_MX400_1 flows src=71.137.67.69 dst=55.22.5.48 protocol=tcp sport=5572 dport=25 pattern: 1 dst 55.22.5.48 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096830.232683052 NORDC_MX400_1 flows src=71.137.67.69 dst=55.22.5.48 protocol=tcp sport=5572 dport=25 pattern: 1 dst 55.22.5.48 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 5572
protocol: 6
streamN... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.084040385 NORDC_MX400_1 flows src=224.167.60.163 dst=101.94.89.114 protocol=tcp sport=62176 dport=25 pattern: 1 dst 101.94.89.114 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096829.084040385 NORDC_MX400_1 flows src=224.167.60.163... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096829.084040385 NORDC_MX400_1 flows src=224.167.60.163 dst=101.94.89.114 protocol=tcp sport=62176 dport=25 pattern: 1 dst 101.94.89.114 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.084040385 NORDC_MX400_1 flows src=224.167.60.163 dst=101.94.89.114 protocol=tcp sport=62176 dport=25 pattern: 1 dst 101.94.89.114 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 62176
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.084040385 NORDC_MX400_1 flows src=248.132.7.166 dst=186.216.79.144 protocol=tcp sport=62176 dport=25 pattern: 1 dst 186.216.79.144 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096829.084040385 NORDC_MX400_1 flows src=248.132.7.166 ... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096829.084040385 NORDC_MX400_1 flows src=248.132.7.166 dst=186.216.79.144 protocol=tcp sport=62176 dport=25 pattern: 1 dst 186.216.79.144 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.084040385 NORDC_MX400_1 flows src=248.132.7.166 dst=186.216.79.144 protocol=tcp sport=62176 dport=25 pattern: 1 dst 186.216.79.144 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 62176
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.519586685 NORDC_MX400_1 flows src=97.226.115.207 dst=46.253.141.194 protocol=tcp sport=54337 dport=25 pattern: 1 dst 46.253.141.194 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096829.519586685 NORDC_MX400_1 flows src=97.226.115.207... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096829.519586685 NORDC_MX400_1 flows src=97.226.115.207 dst=46.253.141.194 protocol=tcp sport=54337 dport=25 pattern: 1 dst 46.253.141.194 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.519586685 NORDC_MX400_1 flows src=97.226.115.207 dst=46.253.141.194 protocol=tcp sport=54337 dport=25 pattern: 1 dst 46.253.141.194 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 54337
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.519586685 NORDC_MX400_1 flows src=246.71.120.101 dst=85.132.243.3 protocol=tcp sport=54337 dport=25 pattern: 1 dst 85.132.243.3 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096829.519586685 NORDC_MX400_1 flows src=246.71.120.101... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096829.519586685 NORDC_MX400_1 flows src=246.71.120.101 dst=85.132.243.3 protocol=tcp sport=54337 dport=25 pattern: 1 dst 85.132.243.3 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.519586685 NORDC_MX400_1 flows src=246.71.120.101 dst=85.132.243.3 protocol=tcp sport=54337 dport=25 pattern: 1 dst 85.132.243.3 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 54337
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.601296908 NORDC_MX400_1 flows src=84.75.103.34 dst=177.95.168.183 protocol=tcp sport=27808 dport=25 pattern: 1 dst 177.95.168.183 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096829.601296908 NORDC_MX400_1 flows src=84.75.103.34 d... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096829.601296908 NORDC_MX400_1 flows src=84.75.103.34 dst=177.95.168.183 protocol=tcp sport=27808 dport=25 pattern: 1 dst 177.95.168.183 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.601296908 NORDC_MX400_1 flows src=84.75.103.34 dst=177.95.168.183 protocol=tcp sport=27808 dport=25 pattern: 1 dst 177.95.168.183 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 27808
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.601296908 NORDC_MX400_1 flows src=118.140.4.111 dst=245.155.241.75 protocol=tcp sport=27808 dport=25 pattern: 1 dst 245.155.241.75 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096829.601296908 NORDC_MX400_1 flows src=118.140.4.111 ... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096829.601296908 NORDC_MX400_1 flows src=118.140.4.111 dst=245.155.241.75 protocol=tcp sport=27808 dport=25 pattern: 1 dst 245.155.241.75 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.601296908 NORDC_MX400_1 flows src=118.140.4.111 dst=245.155.241.75 protocol=tcp sport=27808 dport=25 pattern: 1 dst 245.155.241.75 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 27808
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.997370779 NORDC_MX400_1 flows src=81.61.132.93 dst=199.120.82.218 protocol=tcp sport=53600 dport=25 pattern: 1 dst 199.120.82.218 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096829.997370779 NORDC_MX400_1 flows src=81.61.132.93 d... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096829.997370779 NORDC_MX400_1 flows src=81.61.132.93 dst=199.120.82.218 protocol=tcp sport=53600 dport=25 pattern: 1 dst 199.120.82.218 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.997370779 NORDC_MX400_1 flows src=81.61.132.93 dst=199.120.82.218 protocol=tcp sport=53600 dport=25 pattern: 1 dst 199.120.82.218 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 53600
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.997370779 NORDC_MX400_1 flows src=206.241.94.91 dst=50.13.162.40 protocol=tcp sport=53600 dport=25 pattern: 1 dst 50.13.162.40 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096829.997370779 NORDC_MX400_1 flows src=206.241.94.91 ... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096829.997370779 NORDC_MX400_1 flows src=206.241.94.91 dst=50.13.162.40 protocol=tcp sport=53600 dport=25 pattern: 1 dst 50.13.162.40 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.997370779 NORDC_MX400_1 flows src=206.241.94.91 dst=50.13.162.40 protocol=tcp sport=53600 dport=25 pattern: 1 dst 50.13.162.40 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 53600
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.879609832 NORDC_MX400_1 flows src=35.236.139.76 dst=51.87.94.126 protocol=tcp sport=40807 dport=25 pattern: 1 dst 51.87.94.126 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096829.879609832 NORDC_MX400_1 flows src=35.236.139.76 ... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096829.879609832 NORDC_MX400_1 flows src=35.236.139.76 dst=51.87.94.126 protocol=tcp sport=40807 dport=25 pattern: 1 dst 51.87.94.126 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.879609832 NORDC_MX400_1 flows src=35.236.139.76 dst=51.87.94.126 protocol=tcp sport=40807 dport=25 pattern: 1 dst 51.87.94.126 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 40807
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.879609832 NORDC_MX400_1 flows src=86.168.176.140 dst=183.215.236.4 protocol=tcp sport=40807 dport=25 pattern: 1 dst 183.215.236.4 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096829.879609832 NORDC_MX400_1 flows src=86.168.176.140... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096829.879609832 NORDC_MX400_1 flows src=86.168.176.140 dst=183.215.236.4 protocol=tcp sport=40807 dport=25 pattern: 1 dst 183.215.236.4 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096829.879609832 NORDC_MX400_1 flows src=86.168.176.140 dst=183.215.236.4 protocol=tcp sport=40807 dport=25 pattern: 1 dst 183.215.236.4 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 40807
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096830.918310053 NORDC_MX400_1 flows src=212.214.53.89 dst=184.187.184.23 protocol=udp sport=4104 dport=4104 pattern: 1 dst 184.187.184.23 | {
"senderhost": "192.168.2.250",
"serverport": 4104,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096830.918310053 NORDC_MX400_1 flows src=212.214.53.8... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096830.918310053 NORDC_MX400_1 flows src=212.214.53.89 dst=184.187.184.23 protocol=udp sport=4104 dport=4104 pattern: 1 dst 184.187.184.23 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096830.918310053 NORDC_MX400_1 flows src=212.214.53.89 dst=184.187.184.23 protocol=udp sport=4104 dport=4104 pattern: 1 dst 184.187.184.23 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 4104
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 4104
protocol: 17
stre... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1661096830.918310053 NORDC_MX400_1 flows src=190.230.220.27 dst=195.202.61.2 protocol=udp sport=4104 dport=4104 pattern: 1 dst 195.202.61.2 | {
"senderhost": "192.168.2.250",
"serverport": 4104,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1661096830.918310053 NORDC_MX400_1 flows src=190.230.220.... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1661096830.918310053 NORDC_MX400_1 flows src=190.230.220.27 dst=195.202.61.2 protocol=udp sport=4104 dport=4104 pattern: 1 dst 195.202.61.2 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1661096830.918310053 NORDC_MX400_1 flows src=190.230.220.27 dst=195.202.61.2 protocol=udp sport=4104 dport=4104 pattern: 1 dst 195.202.61.2 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 4104
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 4104
protocol: 17
stre... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=74.60.134.91 dst=161.154.69.196 protocol=tcp sport=27316 dport=25 pattern: 1 dst 161.154.69.196 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=74.60.134.91 d... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=74.60.134.91 dst=161.154.69.196 protocol=tcp sport=27316 dport=25 pattern: 1 dst 161.154.69.196 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=74.60.134.91 dst=161.154.69.196 protocol=tcp sport=27316 dport=25 pattern: 1 dst 161.154.69.196 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 27316
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=226.147.37.130 dst=79.2.49.235 protocol=tcp sport=27316 dport=25 pattern: 1 dst 79.2.49.235 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=226.147.37.130... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=226.147.37.130 dst=79.2.49.235 protocol=tcp sport=27316 dport=25 pattern: 1 dst 79.2.49.235 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=226.147.37.130 dst=79.2.49.235 protocol=tcp sport=27316 dport=25 pattern: 1 dst 79.2.49.235 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 27316
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1657178921.042876082 NORDC_MX400_1 flows src=142.50.36.161 dst=182.32.77.4 protocol=tcp sport=33750 dport=25 pattern: 1 dst 182.32.77.4 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1657178921.042876082 NORDC_MX400_1 flows src=142.50.36.161 ... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1657178921.042876082 NORDC_MX400_1 flows src=142.50.36.161 dst=182.32.77.4 protocol=tcp sport=33750 dport=25 pattern: 1 dst 182.32.77.4 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1657178921.042876082 NORDC_MX400_1 flows src=142.50.36.161 dst=182.32.77.4 protocol=tcp sport=33750 dport=25 pattern: 1 dst 182.32.77.4 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 33750
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1657178921.042876082 NORDC_MX400_1 flows src=141.159.198.204 dst=236.56.253.106 protocol=tcp sport=33750 dport=25 pattern: 1 dst 236.56.253.106 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1657178921.042876082 NORDC_MX400_1 flows src=141.159.198.20... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1657178921.042876082 NORDC_MX400_1 flows src=141.159.198.204 dst=236.56.253.106 protocol=tcp sport=33750 dport=25 pattern: 1 dst 236.56.253.106 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1657178921.042876082 NORDC_MX400_1 flows src=141.159.198.204 dst=236.56.253.106 protocol=tcp sport=33750 dport=25 pattern: 1 dst 236.56.253.106 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 33750
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1657178921.243297544 NORDC_MX400_1 flows src=220.5.153.113 dst=67.231.138.115 protocol=tcp sport=32993 dport=25 pattern: 1 dst 67.231.138.115 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1657178921.243297544 NORDC_MX400_1 flows src=220.5.153.113 ... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1657178921.243297544 NORDC_MX400_1 flows src=220.5.153.113 dst=67.231.138.115 protocol=tcp sport=32993 dport=25 pattern: 1 dst 67.231.138.115 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1657178921.243297544 NORDC_MX400_1 flows src=220.5.153.113 dst=67.231.138.115 protocol=tcp sport=32993 dport=25 pattern: 1 dst 67.231.138.115 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 32993
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1657178921.243297544 NORDC_MX400_1 flows src=96.13.45.50 dst=53.201.196.172 protocol=tcp sport=32993 dport=25 pattern: 1 dst 53.201.196.172 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1657178921.243297544 NORDC_MX400_1 flows src=96.13.45.50 ds... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1657178921.243297544 NORDC_MX400_1 flows src=96.13.45.50 dst=53.201.196.172 protocol=tcp sport=32993 dport=25 pattern: 1 dst 53.201.196.172 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1657178921.243297544 NORDC_MX400_1 flows src=96.13.45.50 dst=53.201.196.172 protocol=tcp sport=32993 dport=25 pattern: 1 dst 53.201.196.172 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 32993
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=173.152.176.148 dst=56.163.190.40 protocol=tcp sport=27316 dport=25 pattern: 1 dst 56.163.190.40 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=173.152.176.14... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=173.152.176.148 dst=56.163.190.40 protocol=tcp sport=27316 dport=25 pattern: 1 dst 56.163.190.40 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=173.152.176.148 dst=56.163.190.40 protocol=tcp sport=27316 dport=25 pattern: 1 dst 56.163.190.40 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 27316
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=232.186.101.247 dst=56.13.184.85 protocol=tcp sport=27316 dport=25 pattern: 1 dst 56.13.184.85 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=232.186.101.24... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=232.186.101.247 dst=56.13.184.85 protocol=tcp sport=27316 dport=25 pattern: 1 dst 56.13.184.85 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1657178921.322951744 NORDC_MX400_1 flows src=232.186.101.247 dst=56.13.184.85 protocol=tcp sport=27316 dport=25 pattern: 1 dst 56.13.184.85 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 27316
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1657178920.538141736 NORDC_MX400_1 flows src=246.73.147.196 dst=175.149.151.112 protocol=tcp sport=53089 dport=25 pattern: 1 dst 175.149.151.112 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1657178920.538141736 NORDC_MX400_1 flows src=246.73.147.196... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1657178920.538141736 NORDC_MX400_1 flows src=246.73.147.196 dst=175.149.151.112 protocol=tcp sport=53089 dport=25 pattern: 1 dst 175.149.151.112 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1657178920.538141736 NORDC_MX400_1 flows src=246.73.147.196 dst=175.149.151.112 protocol=tcp sport=53089 dport=25 pattern: 1 dst 175.149.151.112 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 53089
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1657178920.538141736 NORDC_MX400_1 flows src=159.146.142.71 dst=17.6.107.205 protocol=tcp sport=53089 dport=25 pattern: 1 dst 17.6.107.205 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1657178920.538141736 NORDC_MX400_1 flows src=159.146.142.71... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1657178920.538141736 NORDC_MX400_1 flows src=159.146.142.71 dst=17.6.107.205 protocol=tcp sport=53089 dport=25 pattern: 1 dst 17.6.107.205 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1657178920.538141736 NORDC_MX400_1 flows src=159.146.142.71 dst=17.6.107.205 protocol=tcp sport=53089 dport=25 pattern: 1 dst 17.6.107.205 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 53089
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=240.72.198.90 dst=163.26.75.177 protocol=tcp sport=54280 dport=81 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 81,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=240.72.198.90 ... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=240.72.198.90 dst=163.26.75.177 protocol=tcp sport=54280 dport=81 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=240.72.198.90 dst=163.26.75.177 protocol=tcp sport=54280 dport=81 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 81
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 54280
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=169.234.225.158 dst=217.189.85.161 protocol=tcp sport=54280 dport=81 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 81,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=169.234.225.15... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=169.234.225.158 dst=217.189.85.161 protocol=tcp sport=54280 dport=81 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=169.234.225.158 dst=217.189.85.161 protocol=tcp sport=54280 dport=81 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 81
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 54280
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=110.199.160.209 dst=112.249.90.88 protocol=tcp sport=54280 dport=81 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 81,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=110.199.160.20... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=110.199.160.209 dst=112.249.90.88 protocol=tcp sport=54280 dport=81 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=110.199.160.209 dst=112.249.90.88 protocol=tcp sport=54280 dport=81 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 81
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 54280
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=93.187.129.186 dst=10.44.36.46 protocol=tcp sport=54280 dport=81 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 81,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=93.187.129.186... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=93.187.129.186 dst=10.44.36.46 protocol=tcp sport=54280 dport=81 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655152078.084991394 NORDC_MX400_1 flows src=93.187.129.186 dst=10.44.36.46 protocol=tcp sport=54280 dport=81 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 81
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 54280
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655152365.212890085 NORDC_MX400_1 flows src=101.60.99.48 dst=17.73.33.129 protocol=tcp sport=46288 dport=3817 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 3817,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655152365.212890085 NORDC_MX400_1 flows src=101.60.99.48... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655152365.212890085 NORDC_MX400_1 flows src=101.60.99.48 dst=17.73.33.129 protocol=tcp sport=46288 dport=3817 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655152365.212890085 NORDC_MX400_1 flows src=101.60.99.48 dst=17.73.33.129 protocol=tcp sport=46288 dport=3817 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 3817
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 46288
protocol: 6
stre... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655152365.212890085 NORDC_MX400_1 flows src=24.156.165.54 dst=131.192.183.255 protocol=tcp sport=46288 dport=3817 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 3817,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655152365.212890085 NORDC_MX400_1 flows src=24.156.165.5... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655152365.212890085 NORDC_MX400_1 flows src=24.156.165.54 dst=131.192.183.255 protocol=tcp sport=46288 dport=3817 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1655152365.212890085 NORDC_MX400_1 flows src=24.156.165.54 dst=131.192.183.255 protocol=tcp sport=46288 dport=3817 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 3817
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 46288
protocol: 6
stre... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1655152365.212890085 NORDC_MX400_1 flows src=93.121.34.91 dst=200.175.219.14 protocol=tcp sport=46288 dport=3817 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 3817,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1655152365.212890085 NORDC_MX400_1 flows src=93.121.34.91... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1655152365.212890085 NORDC_MX400_1 flows src=93.121.34.91 dst=200.175.219.14 protocol=tcp sport=46288 dport=3817 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.