input_text
stringlengths
52
64.8k
output_text
stringlengths
23
66k
instruction
stringclasses
3 values
<164>Sep 18 2022 12:19:45: %ASA-4-106023: Deny udp src outside:166.70.136.115/18386 dst dmz-1:226.179.215.66/53 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 53, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", ...
Create a JSON artifact from the message
<164>Sep 18 2022 12:19:45: %ASA-4-106023: Deny udp src outside:166.70.136.115/18386 dst dmz-1:226.179.215.66/53 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 18 2022 12:19:45: %ASA-4-106023: Deny udp src outside:166.70.136.115/18386 dst dmz-1:226.179.215.66/53 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 53 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown se...
Explain this syslog message
<164>Sep 18 2022 12:19:45: %ASA-4-106023: Deny udp src outside:27.225.43.156/18386 dst dmz-1:230.171.127.205/53 by access-group "outside_access_in" [0x0, 0x0]
{ "priority": 164, "senderhost": "10.0.0.1", "serverport": 53, "severitylabel": "warning", "tags": [ "cisco_asa_deny", "deny", "cisco_asa", "firewall_action" ], "productids": [ 17, 0 ], "severitycode": 4, "sourceinfo": "unknown", ...
Create a JSON artifact from the message
<164>Sep 18 2022 12:19:45: %ASA-4-106023: Deny udp src outside:27.225.43.156/18386 dst dmz-1:230.171.127.205/53 by access-group "outside_access_in" [0x0, 0x0]
Product: ASA Firewall Vendor: Cisco
Identify this syslog message
<164>Sep 18 2022 12:19:45: %ASA-4-106023: Deny udp src outside:27.225.43.156/18386 dst dmz-1:230.171.127.205/53 by access-group "outside_access_in" [0x0, 0x0]
This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message: priority: 164 senderhost: 10.0.0.1 serverport: 53 severitylabel: warning tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action'] productids: [17, 0] severitycode: 4 sourceinfo: unknown se...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=67.144.221.210 dst=115.117.69.79 protocol=tcp sport=58113 dport=25 pattern: 1 dst 115.117.69.79
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=67.144.221.210...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=67.144.221.210 dst=115.117.69.79 protocol=tcp sport=58113 dport=25 pattern: 1 dst 115.117.69.79
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=67.144.221.210 dst=115.117.69.79 protocol=tcp sport=58113 dport=25 pattern: 1 dst 115.117.69.79
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 58113 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=188.133.43.197 dst=105.35.245.90 protocol=tcp sport=58113 dport=25 pattern: 1 dst 105.35.245.90
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=188.133.43.197...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=188.133.43.197 dst=105.35.245.90 protocol=tcp sport=58113 dport=25 pattern: 1 dst 105.35.245.90
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=188.133.43.197 dst=105.35.245.90 protocol=tcp sport=58113 dport=25 pattern: 1 dst 105.35.245.90
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 58113 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1663633277.233652463 NORDC_MX400_1 flows src=204.236.124.97 dst=5.7.3.163 protocol=tcp sport=6192 dport=25 pattern: 1 dst 5.7.3.163
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1663633277.233652463 NORDC_MX400_1 flows src=204.236.124.97...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1663633277.233652463 NORDC_MX400_1 flows src=204.236.124.97 dst=5.7.3.163 protocol=tcp sport=6192 dport=25 pattern: 1 dst 5.7.3.163
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1663633277.233652463 NORDC_MX400_1 flows src=204.236.124.97 dst=5.7.3.163 protocol=tcp sport=6192 dport=25 pattern: 1 dst 5.7.3.163
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 6192 protocol: 6 streamN...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1663633277.233652463 NORDC_MX400_1 flows src=161.48.130.216 dst=73.27.171.219 protocol=tcp sport=6192 dport=25 pattern: 1 dst 73.27.171.219
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1663633277.233652463 NORDC_MX400_1 flows src=161.48.130.216...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1663633277.233652463 NORDC_MX400_1 flows src=161.48.130.216 dst=73.27.171.219 protocol=tcp sport=6192 dport=25 pattern: 1 dst 73.27.171.219
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1663633277.233652463 NORDC_MX400_1 flows src=161.48.130.216 dst=73.27.171.219 protocol=tcp sport=6192 dport=25 pattern: 1 dst 73.27.171.219
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 6192 protocol: 6 streamN...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1663633277.226192129 NORDC_MX400_1 flows src=197.52.22.13 dst=115.143.165.155 protocol=tcp sport=15378 dport=25 pattern: 1 dst 115.143.165.155
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1663633277.226192129 NORDC_MX400_1 flows src=197.52.22.13 d...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1663633277.226192129 NORDC_MX400_1 flows src=197.52.22.13 dst=115.143.165.155 protocol=tcp sport=15378 dport=25 pattern: 1 dst 115.143.165.155
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1663633277.226192129 NORDC_MX400_1 flows src=197.52.22.13 dst=115.143.165.155 protocol=tcp sport=15378 dport=25 pattern: 1 dst 115.143.165.155
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 15378 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1663633277.226192129 NORDC_MX400_1 flows src=125.236.75.208 dst=58.47.26.79 protocol=tcp sport=15378 dport=25 pattern: 1 dst 58.47.26.79
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1663633277.226192129 NORDC_MX400_1 flows src=125.236.75.208...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1663633277.226192129 NORDC_MX400_1 flows src=125.236.75.208 dst=58.47.26.79 protocol=tcp sport=15378 dport=25 pattern: 1 dst 58.47.26.79
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1663633277.226192129 NORDC_MX400_1 flows src=125.236.75.208 dst=58.47.26.79 protocol=tcp sport=15378 dport=25 pattern: 1 dst 58.47.26.79
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 15378 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=186.66.111.132 dst=10.205.135.5 protocol=tcp sport=58113 dport=25 pattern: 1 dst 10.205.135.5
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=186.66.111.132...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=186.66.111.132 dst=10.205.135.5 protocol=tcp sport=58113 dport=25 pattern: 1 dst 10.205.135.5
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=186.66.111.132 dst=10.205.135.5 protocol=tcp sport=58113 dport=25 pattern: 1 dst 10.205.135.5
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 58113 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=35.87.238.118 dst=211.237.36.242 protocol=tcp sport=58113 dport=25 pattern: 1 dst 211.237.36.242
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=35.87.238.118 ...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=35.87.238.118 dst=211.237.36.242 protocol=tcp sport=58113 dport=25 pattern: 1 dst 211.237.36.242
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1663633277.241581923 NORDC_MX400_1 flows src=35.87.238.118 dst=211.237.36.242 protocol=tcp sport=58113 dport=25 pattern: 1 dst 211.237.36.242
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 58113 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1663633277.389541881 NORDC_MX400_1 flows src=173.200.237.219 dst=169.126.210.177 protocol=tcp sport=37994 dport=25 pattern: 1 dst 169.126.210.177
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1663633277.389541881 NORDC_MX400_1 flows src=173.200.237.21...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1663633277.389541881 NORDC_MX400_1 flows src=173.200.237.219 dst=169.126.210.177 protocol=tcp sport=37994 dport=25 pattern: 1 dst 169.126.210.177
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1663633277.389541881 NORDC_MX400_1 flows src=173.200.237.219 dst=169.126.210.177 protocol=tcp sport=37994 dport=25 pattern: 1 dst 169.126.210.177
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 37994 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1663633277.389541881 NORDC_MX400_1 flows src=120.155.35.249 dst=152.49.210.21 protocol=tcp sport=37994 dport=25 pattern: 1 dst 152.49.210.21
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1663633277.389541881 NORDC_MX400_1 flows src=120.155.35.249...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1663633277.389541881 NORDC_MX400_1 flows src=120.155.35.249 dst=152.49.210.21 protocol=tcp sport=37994 dport=25 pattern: 1 dst 152.49.210.21
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1663633277.389541881 NORDC_MX400_1 flows src=120.155.35.249 dst=152.49.210.21 protocol=tcp sport=37994 dport=25 pattern: 1 dst 152.49.210.21
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 37994 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1663633277.776776630 NORDC_MX400_1 flows src=12.161.240.106 dst=142.185.210.226 protocol=tcp sport=9068 dport=25 pattern: 1 dst 142.185.210.226
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1663633277.776776630 NORDC_MX400_1 flows src=12.161.240.106...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1663633277.776776630 NORDC_MX400_1 flows src=12.161.240.106 dst=142.185.210.226 protocol=tcp sport=9068 dport=25 pattern: 1 dst 142.185.210.226
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1663633277.776776630 NORDC_MX400_1 flows src=12.161.240.106 dst=142.185.210.226 protocol=tcp sport=9068 dport=25 pattern: 1 dst 142.185.210.226
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 9068 protocol: 6 streamN...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1663633277.776776630 NORDC_MX400_1 flows src=33.44.133.201 dst=51.195.121.122 protocol=tcp sport=9068 dport=25 pattern: 1 dst 51.195.121.122
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1663633277.776776630 NORDC_MX400_1 flows src=33.44.133.201 ...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1663633277.776776630 NORDC_MX400_1 flows src=33.44.133.201 dst=51.195.121.122 protocol=tcp sport=9068 dport=25 pattern: 1 dst 51.195.121.122
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1663633277.776776630 NORDC_MX400_1 flows src=33.44.133.201 dst=51.195.121.122 protocol=tcp sport=9068 dport=25 pattern: 1 dst 51.195.121.122
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 9068 protocol: 6 streamN...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1663633277.808467158 NORDC_MX400_1 flows src=160.151.210.101 dst=91.20.18.255 protocol=tcp sport=6182 dport=25 pattern: 1 dst 91.20.18.255
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1663633277.808467158 NORDC_MX400_1 flows src=160.151.210.10...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1663633277.808467158 NORDC_MX400_1 flows src=160.151.210.101 dst=91.20.18.255 protocol=tcp sport=6182 dport=25 pattern: 1 dst 91.20.18.255
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1663633277.808467158 NORDC_MX400_1 flows src=160.151.210.101 dst=91.20.18.255 protocol=tcp sport=6182 dport=25 pattern: 1 dst 91.20.18.255
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 6182 protocol: 6 streamN...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1663633277.808467158 NORDC_MX400_1 flows src=148.147.244.78 dst=190.141.16.201 protocol=tcp sport=6182 dport=25 pattern: 1 dst 190.141.16.201
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1663633277.808467158 NORDC_MX400_1 flows src=148.147.244.78...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1663633277.808467158 NORDC_MX400_1 flows src=148.147.244.78 dst=190.141.16.201 protocol=tcp sport=6182 dport=25 pattern: 1 dst 190.141.16.201
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1663633277.808467158 NORDC_MX400_1 flows src=148.147.244.78 dst=190.141.16.201 protocol=tcp sport=6182 dport=25 pattern: 1 dst 190.141.16.201
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 6182 protocol: 6 streamN...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1663633277.301569088 NORDC_MX400_1 flows src=95.220.97.181 dst=27.193.6.191 protocol=tcp sport=6175 dport=25 pattern: 1 dst 27.193.6.191
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1663633277.301569088 NORDC_MX400_1 flows src=95.220.97.181 ...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1663633277.301569088 NORDC_MX400_1 flows src=95.220.97.181 dst=27.193.6.191 protocol=tcp sport=6175 dport=25 pattern: 1 dst 27.193.6.191
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1663633277.301569088 NORDC_MX400_1 flows src=95.220.97.181 dst=27.193.6.191 protocol=tcp sport=6175 dport=25 pattern: 1 dst 27.193.6.191
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 6175 protocol: 6 streamN...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1663633277.301569088 NORDC_MX400_1 flows src=20.182.64.231 dst=229.181.176.221 protocol=tcp sport=6175 dport=25 pattern: 1 dst 229.181.176.221
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1663633277.301569088 NORDC_MX400_1 flows src=20.182.64.231 ...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1663633277.301569088 NORDC_MX400_1 flows src=20.182.64.231 dst=229.181.176.221 protocol=tcp sport=6175 dport=25 pattern: 1 dst 229.181.176.221
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1663633277.301569088 NORDC_MX400_1 flows src=20.182.64.231 dst=229.181.176.221 protocol=tcp sport=6175 dport=25 pattern: 1 dst 229.181.176.221
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 6175 protocol: 6 streamN...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1663633277.309734870 NORDC_MX400_1 flows src=111.223.182.25 dst=241.147.84.10 protocol=tcp sport=22528 dport=25 pattern: 1 dst 241.147.84.10
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1663633277.309734870 NORDC_MX400_1 flows src=111.223.182.25...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1663633277.309734870 NORDC_MX400_1 flows src=111.223.182.25 dst=241.147.84.10 protocol=tcp sport=22528 dport=25 pattern: 1 dst 241.147.84.10
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1663633277.309734870 NORDC_MX400_1 flows src=111.223.182.25 dst=241.147.84.10 protocol=tcp sport=22528 dport=25 pattern: 1 dst 241.147.84.10
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 22528 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1663633277.309734870 NORDC_MX400_1 flows src=192.160.220.199 dst=122.73.64.19 protocol=tcp sport=22528 dport=25 pattern: 1 dst 122.73.64.19
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1663633277.309734870 NORDC_MX400_1 flows src=192.160.220.19...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1663633277.309734870 NORDC_MX400_1 flows src=192.160.220.199 dst=122.73.64.19 protocol=tcp sport=22528 dport=25 pattern: 1 dst 122.73.64.19
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1663633277.309734870 NORDC_MX400_1 flows src=192.160.220.199 dst=122.73.64.19 protocol=tcp sport=22528 dport=25 pattern: 1 dst 122.73.64.19
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 22528 protocol: 6 stream...
Explain this syslog message
<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=251.238.62.175 dst=175.67.111.116 protocol=tcp sport=13079 dport=902 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 902, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=251.238....
Create a JSON artifact from the message
<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=251.238.62.175 dst=175.67.111.116 protocol=tcp sport=13079 dport=902 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=251.238.62.175 dst=175.67.111.116 protocol=tcp sport=13079 dport=902 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 902 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 13079 protocol: 6 strea...
Explain this syslog message
<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=74.234.9.122 dst=12.179.142.220 protocol=tcp sport=13079 dport=902 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 902, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=74.234.9...
Create a JSON artifact from the message
<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=74.234.9.122 dst=12.179.142.220 protocol=tcp sport=13079 dport=902 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=74.234.9.122 dst=12.179.142.220 protocol=tcp sport=13079 dport=902 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 902 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 13079 protocol: 6 strea...
Explain this syslog message
<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=77.146.177.107 dst=179.109.118.168 protocol=tcp sport=13079 dport=902 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 902, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=77.146.1...
Create a JSON artifact from the message
<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=77.146.177.107 dst=179.109.118.168 protocol=tcp sport=13079 dport=902 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=77.146.177.107 dst=179.109.118.168 protocol=tcp sport=13079 dport=902 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 902 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 13079 protocol: 6 strea...
Explain this syslog message
<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=98.174.192.12 dst=241.98.50.107 protocol=tcp sport=13079 dport=902 pattern: 1 all
{ "senderhost": "192.168.2.250", "serverport": 902, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=98.174.1...
Create a JSON artifact from the message
<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=98.174.192.12 dst=241.98.50.107 protocol=tcp sport=13079 dport=902 pattern: 1 all
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=205.170.169.42 1 1655165083.939359533 M58_MX67_FtWalton flows src=98.174.192.12 dst=241.98.50.107 protocol=tcp sport=13079 dport=902 pattern: 1 all
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 902 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 13079 protocol: 6 strea...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658389062.666821676 NORDC_MX400_1 flows src=20.75.219.88 dst=34.107.220.87 protocol=tcp sport=47104 dport=25 pattern: 1 dst 34.107.220.87
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658389062.666821676 NORDC_MX400_1 flows src=20.75.219.88 d...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658389062.666821676 NORDC_MX400_1 flows src=20.75.219.88 dst=34.107.220.87 protocol=tcp sport=47104 dport=25 pattern: 1 dst 34.107.220.87
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658389062.666821676 NORDC_MX400_1 flows src=20.75.219.88 dst=34.107.220.87 protocol=tcp sport=47104 dport=25 pattern: 1 dst 34.107.220.87
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 47104 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658389062.666821676 NORDC_MX400_1 flows src=116.0.227.6 dst=33.33.173.49 protocol=tcp sport=47104 dport=25 pattern: 1 dst 33.33.173.49
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658389062.666821676 NORDC_MX400_1 flows src=116.0.227.6 ds...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658389062.666821676 NORDC_MX400_1 flows src=116.0.227.6 dst=33.33.173.49 protocol=tcp sport=47104 dport=25 pattern: 1 dst 33.33.173.49
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658389062.666821676 NORDC_MX400_1 flows src=116.0.227.6 dst=33.33.173.49 protocol=tcp sport=47104 dport=25 pattern: 1 dst 33.33.173.49
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 47104 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658389061.876971670 NORDC_MX400_1 flows src=58.12.126.33 dst=122.19.215.105 protocol=tcp sport=20807 dport=25 pattern: 1 dst 122.19.215.105
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658389061.876971670 NORDC_MX400_1 flows src=58.12.126.33 d...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658389061.876971670 NORDC_MX400_1 flows src=58.12.126.33 dst=122.19.215.105 protocol=tcp sport=20807 dport=25 pattern: 1 dst 122.19.215.105
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658389061.876971670 NORDC_MX400_1 flows src=58.12.126.33 dst=122.19.215.105 protocol=tcp sport=20807 dport=25 pattern: 1 dst 122.19.215.105
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 20807 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658389061.876971670 NORDC_MX400_1 flows src=208.221.40.81 dst=17.197.187.90 protocol=tcp sport=20807 dport=25 pattern: 1 dst 17.197.187.90
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658389061.876971670 NORDC_MX400_1 flows src=208.221.40.81 ...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658389061.876971670 NORDC_MX400_1 flows src=208.221.40.81 dst=17.197.187.90 protocol=tcp sport=20807 dport=25 pattern: 1 dst 17.197.187.90
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658389061.876971670 NORDC_MX400_1 flows src=208.221.40.81 dst=17.197.187.90 protocol=tcp sport=20807 dport=25 pattern: 1 dst 17.197.187.90
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 20807 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658389062.540627277 NORDC_MX400_1 flows src=180.15.146.141 dst=198.162.20.103 protocol=tcp sport=57271 dport=25 pattern: 1 dst 198.162.20.103
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658389062.540627277 NORDC_MX400_1 flows src=180.15.146.141...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658389062.540627277 NORDC_MX400_1 flows src=180.15.146.141 dst=198.162.20.103 protocol=tcp sport=57271 dport=25 pattern: 1 dst 198.162.20.103
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658389062.540627277 NORDC_MX400_1 flows src=180.15.146.141 dst=198.162.20.103 protocol=tcp sport=57271 dport=25 pattern: 1 dst 198.162.20.103
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 57271 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658389062.540627277 NORDC_MX400_1 flows src=170.96.220.53 dst=31.31.245.130 protocol=tcp sport=57271 dport=25 pattern: 1 dst 31.31.245.130
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658389062.540627277 NORDC_MX400_1 flows src=170.96.220.53 ...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658389062.540627277 NORDC_MX400_1 flows src=170.96.220.53 dst=31.31.245.130 protocol=tcp sport=57271 dport=25 pattern: 1 dst 31.31.245.130
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658389062.540627277 NORDC_MX400_1 flows src=170.96.220.53 dst=31.31.245.130 protocol=tcp sport=57271 dport=25 pattern: 1 dst 31.31.245.130
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 57271 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658389062.578624528 NORDC_MX400_1 flows src=204.129.0.121 dst=142.1.152.59 protocol=tcp sport=58721 dport=25 pattern: 1 dst 142.1.152.59
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658389062.578624528 NORDC_MX400_1 flows src=204.129.0.121 ...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658389062.578624528 NORDC_MX400_1 flows src=204.129.0.121 dst=142.1.152.59 protocol=tcp sport=58721 dport=25 pattern: 1 dst 142.1.152.59
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658389062.578624528 NORDC_MX400_1 flows src=204.129.0.121 dst=142.1.152.59 protocol=tcp sport=58721 dport=25 pattern: 1 dst 142.1.152.59
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 58721 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658389062.578624528 NORDC_MX400_1 flows src=76.68.182.160 dst=157.155.131.186 protocol=tcp sport=58721 dport=25 pattern: 1 dst 157.155.131.186
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658389062.578624528 NORDC_MX400_1 flows src=76.68.182.160 ...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658389062.578624528 NORDC_MX400_1 flows src=76.68.182.160 dst=157.155.131.186 protocol=tcp sport=58721 dport=25 pattern: 1 dst 157.155.131.186
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658389062.578624528 NORDC_MX400_1 flows src=76.68.182.160 dst=157.155.131.186 protocol=tcp sport=58721 dport=25 pattern: 1 dst 157.155.131.186
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 58721 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658389062.593258665 NORDC_MX400_1 flows src=54.56.223.38 dst=130.9.189.44 protocol=tcp sport=41315 dport=25 pattern: 1 dst 130.9.189.44
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658389062.593258665 NORDC_MX400_1 flows src=54.56.223.38 d...
Create a JSON artifact from the message
<134>Original Address=192.168.2.253 1 1658389062.593258665 NORDC_MX400_1 flows src=54.56.223.38 dst=130.9.189.44 protocol=tcp sport=41315 dport=25 pattern: 1 dst 130.9.189.44
Product: Meraki Vendor: Cisco
Identify this syslog message
<134>Original Address=192.168.2.253 1 1658389062.593258665 NORDC_MX400_1 flows src=54.56.223.38 dst=130.9.189.44 protocol=tcp sport=41315 dport=25 pattern: 1 dst 130.9.189.44
This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message: senderhost: 192.168.2.250 serverport: 25 tags: ['deny', 'meraki', 'flow'] productids: [26, 0] sourceinfo: unknown action: block sensitivity: normal messagetype: flow clientport: 41315 protocol: 6 stream...
Explain this syslog message
<134>Original Address=192.168.2.253 1 1658389062.593258665 NORDC_MX400_1 flows src=45.134.53.224 dst=230.209.212.226 protocol=tcp sport=41315 dport=25 pattern: 1 dst 230.209.212.226
{ "senderhost": "192.168.2.250", "serverport": 25, "tags": [ "deny", "meraki", "flow" ], "productids": [ 26, 0 ], "sourceinfo": "unknown", "message": "<134>Original Address=192.168.2.253 1 1658389062.593258665 NORDC_MX400_1 flows src=45.134.53.224 ...
Create a JSON artifact from the message