input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3
values |
|---|---|---|
<164>Sep 18 2022 12:19:45: %ASA-4-106023: Deny udp src outside:166.70.136.115/18386 dst dmz-1:226.179.215.66/53 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 53,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Sep 18 2022 12:19:45: %ASA-4-106023: Deny udp src outside:166.70.136.115/18386 dst dmz-1:226.179.215.66/53 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 18 2022 12:19:45: %ASA-4-106023: Deny udp src outside:166.70.136.115/18386 dst dmz-1:226.179.215.66/53 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 53
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
se... | Explain this syslog message |
<164>Sep 18 2022 12:19:45: %ASA-4-106023: Deny udp src outside:27.225.43.156/18386 dst dmz-1:230.171.127.205/53 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 53,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Sep 18 2022 12:19:45: %ASA-4-106023: Deny udp src outside:27.225.43.156/18386 dst dmz-1:230.171.127.205/53 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Sep 18 2022 12:19:45: %ASA-4-106023: Deny udp src outside:27.225.43.156/18386 dst dmz-1:230.171.127.205/53 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 53
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
se... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=67.144.221.210 dst=115.117.69.79 protocol=tcp sport=58113 dport=25 pattern: 1 dst 115.117.69.79 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=67.144.221.210... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=67.144.221.210 dst=115.117.69.79 protocol=tcp sport=58113 dport=25 pattern: 1 dst 115.117.69.79 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=67.144.221.210 dst=115.117.69.79 protocol=tcp sport=58113 dport=25 pattern: 1 dst 115.117.69.79 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 58113
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=188.133.43.197 dst=105.35.245.90 protocol=tcp sport=58113 dport=25 pattern: 1 dst 105.35.245.90 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=188.133.43.197... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=188.133.43.197 dst=105.35.245.90 protocol=tcp sport=58113 dport=25 pattern: 1 dst 105.35.245.90 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=188.133.43.197 dst=105.35.245.90 protocol=tcp sport=58113 dport=25 pattern: 1 dst 105.35.245.90 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 58113
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.233652463 NORDC_MX400_1 flows src=204.236.124.97 dst=5.7.3.163 protocol=tcp sport=6192 dport=25 pattern: 1 dst 5.7.3.163 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1663633277.233652463 NORDC_MX400_1 flows src=204.236.124.97... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1663633277.233652463 NORDC_MX400_1 flows src=204.236.124.97 dst=5.7.3.163 protocol=tcp sport=6192 dport=25 pattern: 1 dst 5.7.3.163 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.233652463 NORDC_MX400_1 flows src=204.236.124.97 dst=5.7.3.163 protocol=tcp sport=6192 dport=25 pattern: 1 dst 5.7.3.163 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6192
protocol: 6
streamN... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.233652463 NORDC_MX400_1 flows src=161.48.130.216 dst=73.27.171.219 protocol=tcp sport=6192 dport=25 pattern: 1 dst 73.27.171.219 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1663633277.233652463 NORDC_MX400_1 flows src=161.48.130.216... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1663633277.233652463 NORDC_MX400_1 flows src=161.48.130.216 dst=73.27.171.219 protocol=tcp sport=6192 dport=25 pattern: 1 dst 73.27.171.219 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.233652463 NORDC_MX400_1 flows src=161.48.130.216 dst=73.27.171.219 protocol=tcp sport=6192 dport=25 pattern: 1 dst 73.27.171.219 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6192
protocol: 6
streamN... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.226192129 NORDC_MX400_1 flows src=197.52.22.13 dst=115.143.165.155 protocol=tcp sport=15378 dport=25 pattern: 1 dst 115.143.165.155 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1663633277.226192129 NORDC_MX400_1 flows src=197.52.22.13 d... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1663633277.226192129 NORDC_MX400_1 flows src=197.52.22.13 dst=115.143.165.155 protocol=tcp sport=15378 dport=25 pattern: 1 dst 115.143.165.155 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.226192129 NORDC_MX400_1 flows src=197.52.22.13 dst=115.143.165.155 protocol=tcp sport=15378 dport=25 pattern: 1 dst 115.143.165.155 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 15378
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.226192129 NORDC_MX400_1 flows src=125.236.75.208 dst=58.47.26.79 protocol=tcp sport=15378 dport=25 pattern: 1 dst 58.47.26.79 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1663633277.226192129 NORDC_MX400_1 flows src=125.236.75.208... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1663633277.226192129 NORDC_MX400_1 flows src=125.236.75.208 dst=58.47.26.79 protocol=tcp sport=15378 dport=25 pattern: 1 dst 58.47.26.79 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.226192129 NORDC_MX400_1 flows src=125.236.75.208 dst=58.47.26.79 protocol=tcp sport=15378 dport=25 pattern: 1 dst 58.47.26.79 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 15378
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=186.66.111.132 dst=10.205.135.5 protocol=tcp sport=58113 dport=25 pattern: 1 dst 10.205.135.5 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=186.66.111.132... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=186.66.111.132 dst=10.205.135.5 protocol=tcp sport=58113 dport=25 pattern: 1 dst 10.205.135.5 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=186.66.111.132 dst=10.205.135.5 protocol=tcp sport=58113 dport=25 pattern: 1 dst 10.205.135.5 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 58113
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=35.87.238.118 dst=211.237.36.242 protocol=tcp sport=58113 dport=25 pattern: 1 dst 211.237.36.242 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=35.87.238.118 ... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=35.87.238.118 dst=211.237.36.242 protocol=tcp sport=58113 dport=25 pattern: 1 dst 211.237.36.242 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=35.87.238.118 dst=211.237.36.242 protocol=tcp sport=58113 dport=25 pattern: 1 dst 211.237.36.242 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 58113
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.389541881 NORDC_MX400_1 flows src=173.200.237.219 dst=169.126.210.177 protocol=tcp sport=37994 dport=25 pattern: 1 dst 169.126.210.177 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1663633277.389541881 NORDC_MX400_1 flows src=173.200.237.21... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1663633277.389541881 NORDC_MX400_1 flows src=173.200.237.219 dst=169.126.210.177 protocol=tcp sport=37994 dport=25 pattern: 1 dst 169.126.210.177 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.389541881 NORDC_MX400_1 flows src=173.200.237.219 dst=169.126.210.177 protocol=tcp sport=37994 dport=25 pattern: 1 dst 169.126.210.177 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 37994
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.389541881 NORDC_MX400_1 flows src=120.155.35.249 dst=152.49.210.21 protocol=tcp sport=37994 dport=25 pattern: 1 dst 152.49.210.21 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1663633277.389541881 NORDC_MX400_1 flows src=120.155.35.249... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1663633277.389541881 NORDC_MX400_1 flows src=120.155.35.249 dst=152.49.210.21 protocol=tcp sport=37994 dport=25 pattern: 1 dst 152.49.210.21 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.389541881 NORDC_MX400_1 flows src=120.155.35.249 dst=152.49.210.21 protocol=tcp sport=37994 dport=25 pattern: 1 dst 152.49.210.21 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 37994
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.776776630 NORDC_MX400_1 flows src=12.161.240.106 dst=142.185.210.226 protocol=tcp sport=9068 dport=25 pattern: 1 dst 142.185.210.226 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1663633277.776776630 NORDC_MX400_1 flows src=12.161.240.106... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1663633277.776776630 NORDC_MX400_1 flows src=12.161.240.106 dst=142.185.210.226 protocol=tcp sport=9068 dport=25 pattern: 1 dst 142.185.210.226 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.776776630 NORDC_MX400_1 flows src=12.161.240.106 dst=142.185.210.226 protocol=tcp sport=9068 dport=25 pattern: 1 dst 142.185.210.226 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 9068
protocol: 6
streamN... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.776776630 NORDC_MX400_1 flows src=33.44.133.201 dst=51.195.121.122 protocol=tcp sport=9068 dport=25 pattern: 1 dst 51.195.121.122 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1663633277.776776630 NORDC_MX400_1 flows src=33.44.133.201 ... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1663633277.776776630 NORDC_MX400_1 flows src=33.44.133.201 dst=51.195.121.122 protocol=tcp sport=9068 dport=25 pattern: 1 dst 51.195.121.122 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.776776630 NORDC_MX400_1 flows src=33.44.133.201 dst=51.195.121.122 protocol=tcp sport=9068 dport=25 pattern: 1 dst 51.195.121.122 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 9068
protocol: 6
streamN... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.808467158 NORDC_MX400_1 flows src=160.151.210.101 dst=91.20.18.255 protocol=tcp sport=6182 dport=25 pattern: 1 dst 91.20.18.255 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1663633277.808467158 NORDC_MX400_1 flows src=160.151.210.10... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1663633277.808467158 NORDC_MX400_1 flows src=160.151.210.101 dst=91.20.18.255 protocol=tcp sport=6182 dport=25 pattern: 1 dst 91.20.18.255 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.808467158 NORDC_MX400_1 flows src=160.151.210.101 dst=91.20.18.255 protocol=tcp sport=6182 dport=25 pattern: 1 dst 91.20.18.255 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6182
protocol: 6
streamN... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.808467158 NORDC_MX400_1 flows src=148.147.244.78 dst=190.141.16.201 protocol=tcp sport=6182 dport=25 pattern: 1 dst 190.141.16.201 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1663633277.808467158 NORDC_MX400_1 flows src=148.147.244.78... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1663633277.808467158 NORDC_MX400_1 flows src=148.147.244.78 dst=190.141.16.201 protocol=tcp sport=6182 dport=25 pattern: 1 dst 190.141.16.201 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.808467158 NORDC_MX400_1 flows src=148.147.244.78 dst=190.141.16.201 protocol=tcp sport=6182 dport=25 pattern: 1 dst 190.141.16.201 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6182
protocol: 6
streamN... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.301569088 NORDC_MX400_1 flows src=95.220.97.181 dst=27.193.6.191 protocol=tcp sport=6175 dport=25 pattern: 1 dst 27.193.6.191 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1663633277.301569088 NORDC_MX400_1 flows src=95.220.97.181 ... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1663633277.301569088 NORDC_MX400_1 flows src=95.220.97.181 dst=27.193.6.191 protocol=tcp sport=6175 dport=25 pattern: 1 dst 27.193.6.191 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.301569088 NORDC_MX400_1 flows src=95.220.97.181 dst=27.193.6.191 protocol=tcp sport=6175 dport=25 pattern: 1 dst 27.193.6.191 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6175
protocol: 6
streamN... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.301569088 NORDC_MX400_1 flows src=20.182.64.231 dst=229.181.176.221 protocol=tcp sport=6175 dport=25 pattern: 1 dst 229.181.176.221 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1663633277.301569088 NORDC_MX400_1 flows src=20.182.64.231 ... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1663633277.301569088 NORDC_MX400_1 flows src=20.182.64.231 dst=229.181.176.221 protocol=tcp sport=6175 dport=25 pattern: 1 dst 229.181.176.221 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.301569088 NORDC_MX400_1 flows src=20.182.64.231 dst=229.181.176.221 protocol=tcp sport=6175 dport=25 pattern: 1 dst 229.181.176.221 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6175
protocol: 6
streamN... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.309734870 NORDC_MX400_1 flows src=111.223.182.25 dst=241.147.84.10 protocol=tcp sport=22528 dport=25 pattern: 1 dst 241.147.84.10 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1663633277.309734870 NORDC_MX400_1 flows src=111.223.182.25... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1663633277.309734870 NORDC_MX400_1 flows src=111.223.182.25 dst=241.147.84.10 protocol=tcp sport=22528 dport=25 pattern: 1 dst 241.147.84.10 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.309734870 NORDC_MX400_1 flows src=111.223.182.25 dst=241.147.84.10 protocol=tcp sport=22528 dport=25 pattern: 1 dst 241.147.84.10 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 22528
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.309734870 NORDC_MX400_1 flows src=192.160.220.199 dst=122.73.64.19 protocol=tcp sport=22528 dport=25 pattern: 1 dst 122.73.64.19 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1663633277.309734870 NORDC_MX400_1 flows src=192.160.220.19... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1663633277.309734870 NORDC_MX400_1 flows src=192.160.220.199 dst=122.73.64.19 protocol=tcp sport=22528 dport=25 pattern: 1 dst 122.73.64.19 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1663633277.309734870 NORDC_MX400_1 flows src=192.160.220.199 dst=122.73.64.19 protocol=tcp sport=22528 dport=25 pattern: 1 dst 122.73.64.19 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 22528
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=251.238.62.175 dst=175.67.111.116 protocol=tcp sport=13079 dport=902 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 902,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=251.238.... | Create a JSON artifact from the message |
<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=251.238.62.175 dst=175.67.111.116 protocol=tcp sport=13079 dport=902 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=251.238.62.175 dst=175.67.111.116 protocol=tcp sport=13079 dport=902 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 902
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 13079
protocol: 6
strea... | Explain this syslog message |
<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=74.234.9.122 dst=12.179.142.220 protocol=tcp sport=13079 dport=902 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 902,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=74.234.9... | Create a JSON artifact from the message |
<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=74.234.9.122 dst=12.179.142.220 protocol=tcp sport=13079 dport=902 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=74.234.9.122 dst=12.179.142.220 protocol=tcp sport=13079 dport=902 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 902
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 13079
protocol: 6
strea... | Explain this syslog message |
<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=77.146.177.107 dst=179.109.118.168 protocol=tcp sport=13079 dport=902 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 902,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=77.146.1... | Create a JSON artifact from the message |
<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=77.146.177.107 dst=179.109.118.168 protocol=tcp sport=13079 dport=902 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=77.146.177.107 dst=179.109.118.168 protocol=tcp sport=13079 dport=902 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 902
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 13079
protocol: 6
strea... | Explain this syslog message |
<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=98.174.192.12 dst=241.98.50.107 protocol=tcp sport=13079 dport=902 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 902,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=98.174.1... | Create a JSON artifact from the message |
<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=98.174.192.12 dst=241.98.50.107 protocol=tcp sport=13079 dport=902 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=98.174.192.12 dst=241.98.50.107 protocol=tcp sport=13079 dport=902 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 902
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 13079
protocol: 6
strea... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.666821676 NORDC_MX400_1 flows src=20.75.219.88 dst=34.107.220.87 protocol=tcp sport=47104 dport=25 pattern: 1 dst 34.107.220.87 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658389062.666821676 NORDC_MX400_1 flows src=20.75.219.88 d... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658389062.666821676 NORDC_MX400_1 flows src=20.75.219.88 dst=34.107.220.87 protocol=tcp sport=47104 dport=25 pattern: 1 dst 34.107.220.87 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.666821676 NORDC_MX400_1 flows src=20.75.219.88 dst=34.107.220.87 protocol=tcp sport=47104 dport=25 pattern: 1 dst 34.107.220.87 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 47104
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.666821676 NORDC_MX400_1 flows src=116.0.227.6 dst=33.33.173.49 protocol=tcp sport=47104 dport=25 pattern: 1 dst 33.33.173.49 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658389062.666821676 NORDC_MX400_1 flows src=116.0.227.6 ds... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658389062.666821676 NORDC_MX400_1 flows src=116.0.227.6 dst=33.33.173.49 protocol=tcp sport=47104 dport=25 pattern: 1 dst 33.33.173.49 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.666821676 NORDC_MX400_1 flows src=116.0.227.6 dst=33.33.173.49 protocol=tcp sport=47104 dport=25 pattern: 1 dst 33.33.173.49 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 47104
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658389061.876971670 NORDC_MX400_1 flows src=58.12.126.33 dst=122.19.215.105 protocol=tcp sport=20807 dport=25 pattern: 1 dst 122.19.215.105 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658389061.876971670 NORDC_MX400_1 flows src=58.12.126.33 d... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658389061.876971670 NORDC_MX400_1 flows src=58.12.126.33 dst=122.19.215.105 protocol=tcp sport=20807 dport=25 pattern: 1 dst 122.19.215.105 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658389061.876971670 NORDC_MX400_1 flows src=58.12.126.33 dst=122.19.215.105 protocol=tcp sport=20807 dport=25 pattern: 1 dst 122.19.215.105 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 20807
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658389061.876971670 NORDC_MX400_1 flows src=208.221.40.81 dst=17.197.187.90 protocol=tcp sport=20807 dport=25 pattern: 1 dst 17.197.187.90 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658389061.876971670 NORDC_MX400_1 flows src=208.221.40.81 ... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658389061.876971670 NORDC_MX400_1 flows src=208.221.40.81 dst=17.197.187.90 protocol=tcp sport=20807 dport=25 pattern: 1 dst 17.197.187.90 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658389061.876971670 NORDC_MX400_1 flows src=208.221.40.81 dst=17.197.187.90 protocol=tcp sport=20807 dport=25 pattern: 1 dst 17.197.187.90 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 20807
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.540627277 NORDC_MX400_1 flows src=180.15.146.141 dst=198.162.20.103 protocol=tcp sport=57271 dport=25 pattern: 1 dst 198.162.20.103 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658389062.540627277 NORDC_MX400_1 flows src=180.15.146.141... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658389062.540627277 NORDC_MX400_1 flows src=180.15.146.141 dst=198.162.20.103 protocol=tcp sport=57271 dport=25 pattern: 1 dst 198.162.20.103 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.540627277 NORDC_MX400_1 flows src=180.15.146.141 dst=198.162.20.103 protocol=tcp sport=57271 dport=25 pattern: 1 dst 198.162.20.103 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 57271
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.540627277 NORDC_MX400_1 flows src=170.96.220.53 dst=31.31.245.130 protocol=tcp sport=57271 dport=25 pattern: 1 dst 31.31.245.130 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658389062.540627277 NORDC_MX400_1 flows src=170.96.220.53 ... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658389062.540627277 NORDC_MX400_1 flows src=170.96.220.53 dst=31.31.245.130 protocol=tcp sport=57271 dport=25 pattern: 1 dst 31.31.245.130 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.540627277 NORDC_MX400_1 flows src=170.96.220.53 dst=31.31.245.130 protocol=tcp sport=57271 dport=25 pattern: 1 dst 31.31.245.130 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 57271
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.578624528 NORDC_MX400_1 flows src=204.129.0.121 dst=142.1.152.59 protocol=tcp sport=58721 dport=25 pattern: 1 dst 142.1.152.59 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658389062.578624528 NORDC_MX400_1 flows src=204.129.0.121 ... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658389062.578624528 NORDC_MX400_1 flows src=204.129.0.121 dst=142.1.152.59 protocol=tcp sport=58721 dport=25 pattern: 1 dst 142.1.152.59 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.578624528 NORDC_MX400_1 flows src=204.129.0.121 dst=142.1.152.59 protocol=tcp sport=58721 dport=25 pattern: 1 dst 142.1.152.59 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 58721
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.578624528 NORDC_MX400_1 flows src=76.68.182.160 dst=157.155.131.186 protocol=tcp sport=58721 dport=25 pattern: 1 dst 157.155.131.186 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658389062.578624528 NORDC_MX400_1 flows src=76.68.182.160 ... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658389062.578624528 NORDC_MX400_1 flows src=76.68.182.160 dst=157.155.131.186 protocol=tcp sport=58721 dport=25 pattern: 1 dst 157.155.131.186 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.578624528 NORDC_MX400_1 flows src=76.68.182.160 dst=157.155.131.186 protocol=tcp sport=58721 dport=25 pattern: 1 dst 157.155.131.186 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 58721
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.593258665 NORDC_MX400_1 flows src=54.56.223.38 dst=130.9.189.44 protocol=tcp sport=41315 dport=25 pattern: 1 dst 130.9.189.44 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658389062.593258665 NORDC_MX400_1 flows src=54.56.223.38 d... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1658389062.593258665 NORDC_MX400_1 flows src=54.56.223.38 dst=130.9.189.44 protocol=tcp sport=41315 dport=25 pattern: 1 dst 130.9.189.44 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.593258665 NORDC_MX400_1 flows src=54.56.223.38 dst=130.9.189.44 protocol=tcp sport=41315 dport=25 pattern: 1 dst 130.9.189.44 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 41315
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1658389062.593258665 NORDC_MX400_1 flows src=45.134.53.224 dst=230.209.212.226 protocol=tcp sport=41315 dport=25 pattern: 1 dst 230.209.212.226 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1658389062.593258665 NORDC_MX400_1 flows src=45.134.53.224 ... | Create a JSON artifact from the message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.