input_text stringlengths 52 64.8k | output_text stringlengths 23 66k | instruction stringclasses 3
values |
|---|---|---|
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:0.33.18.22 dst INSIDE:170.217.223.242 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 188
senderhost: 10.83.7.3
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: nor... | Explain this syslog message |
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:86.168.64.136 dst INSIDE:15.126.225.152 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
| {
"priority": 188,
"senderhost": "10.83.7.3",
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<188>Fe... | Create a JSON artifact from the message |
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:86.168.64.136 dst INSIDE:15.126.225.152 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:86.168.64.136 dst INSIDE:15.126.225.152 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 188
senderhost: 10.83.7.3
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: nor... | Explain this syslog message |
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:97.36.74.207 dst INSIDE:38.193.212.188 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
| {
"priority": 188,
"senderhost": "10.83.7.3",
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<188>Fe... | Create a JSON artifact from the message |
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:97.36.74.207 dst INSIDE:38.193.212.188 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:97.36.74.207 dst INSIDE:38.193.212.188 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 188
senderhost: 10.83.7.3
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: nor... | Explain this syslog message |
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:16.223.196.122 dst INSIDE:25.207.206.155 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
| {
"priority": 188,
"senderhost": "10.83.7.3",
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
"message": "<188>Fe... | Create a JSON artifact from the message |
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:16.223.196.122 dst INSIDE:25.207.206.155 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<188>Feb 12 2023 13:22:47 tismtlinternetfw1 : %ASA-4-106023: Deny icmp src OUTSIDE:16.223.196.122 dst INSIDE:25.207.206.155 (type 11, code 0) by access-group "OUTSIDE_ACL" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 188
senderhost: 10.83.7.3
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
sensitivity: nor... | Explain this syslog message |
<134>Original Address=10.11.22.1 1 1670017894.936737630 M22_MX67C_Marietta flows src=105.23.144.109 dst=227.152.162.123 protocol=tcp sport=58677 dport=11211 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 11211,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=10.11.22.1 1 1670017894.936737630 M22_MX67C_Marietta flows src=105.23.14... | Create a JSON artifact from the message |
<134>Original Address=10.11.22.1 1 1670017894.936737630 M22_MX67C_Marietta flows src=105.23.144.109 dst=227.152.162.123 protocol=tcp sport=58677 dport=11211 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=10.11.22.1 1 1670017894.936737630 M22_MX67C_Marietta flows src=105.23.144.109 dst=227.152.162.123 protocol=tcp sport=58677 dport=11211 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 11211
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 58677
protocol: 6
str... | Explain this syslog message |
<134>Original Address=10.11.22.1 1 1670017894.936737630 M22_MX67C_Marietta flows src=226.98.15.31 dst=4.52.115.36 protocol=tcp sport=58677 dport=11211 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 11211,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=10.11.22.1 1 1670017894.936737630 M22_MX67C_Marietta flows src=226.98.15... | Create a JSON artifact from the message |
<134>Original Address=10.11.22.1 1 1670017894.936737630 M22_MX67C_Marietta flows src=226.98.15.31 dst=4.52.115.36 protocol=tcp sport=58677 dport=11211 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=10.11.22.1 1 1670017894.936737630 M22_MX67C_Marietta flows src=226.98.15.31 dst=4.52.115.36 protocol=tcp sport=58677 dport=11211 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 11211
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 58677
protocol: 6
str... | Explain this syslog message |
<134>Original Address=10.11.22.1 1 1670017894.936737630 M22_MX67C_Marietta flows src=164.103.207.252 dst=0.40.225.123 protocol=tcp sport=58677 dport=11211 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 11211,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=10.11.22.1 1 1670017894.936737630 M22_MX67C_Marietta flows src=164.103.2... | Create a JSON artifact from the message |
<134>Original Address=10.11.22.1 1 1670017894.936737630 M22_MX67C_Marietta flows src=164.103.207.252 dst=0.40.225.123 protocol=tcp sport=58677 dport=11211 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=10.11.22.1 1 1670017894.936737630 M22_MX67C_Marietta flows src=164.103.207.252 dst=0.40.225.123 protocol=tcp sport=58677 dport=11211 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 11211
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 58677
protocol: 6
str... | Explain this syslog message |
<134>Original Address=10.11.22.1 1 1670017894.936737630 M22_MX67C_Marietta flows src=42.62.146.165 dst=67.158.20.160 protocol=tcp sport=58677 dport=11211 pattern: 1 all | {
"senderhost": "192.168.2.250",
"serverport": 11211,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=10.11.22.1 1 1670017894.936737630 M22_MX67C_Marietta flows src=42.62.146... | Create a JSON artifact from the message |
<134>Original Address=10.11.22.1 1 1670017894.936737630 M22_MX67C_Marietta flows src=42.62.146.165 dst=67.158.20.160 protocol=tcp sport=58677 dport=11211 pattern: 1 all | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=10.11.22.1 1 1670017894.936737630 M22_MX67C_Marietta flows src=42.62.146.165 dst=67.158.20.160 protocol=tcp sport=58677 dport=11211 pattern: 1 all | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 11211
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 58677
protocol: 6
str... | Explain this syslog message |
<164>Feb 01 2023 07:14:56: %ASA-4-106023: Deny tcp src outside:107.220.246.249/44858 dst dmz-1:66.155.240.146/10324 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 10324,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",... | Create a JSON artifact from the message |
<164>Feb 01 2023 07:14:56: %ASA-4-106023: Deny tcp src outside:107.220.246.249/44858 dst dmz-1:66.155.240.146/10324 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Feb 01 2023 07:14:56: %ASA-4-106023: Deny tcp src outside:107.220.246.249/44858 dst dmz-1:66.155.240.146/10324 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 10324
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown... | Explain this syslog message |
<164>Feb 01 2023 07:14:56: %ASA-4-106023: Deny tcp src outside:13.225.139.242/44858 dst dmz-1:165.236.132.176/10324 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 10324,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",... | Create a JSON artifact from the message |
<164>Feb 01 2023 07:14:56: %ASA-4-106023: Deny tcp src outside:13.225.139.242/44858 dst dmz-1:165.236.132.176/10324 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Feb 01 2023 07:14:56: %ASA-4-106023: Deny tcp src outside:13.225.139.242/44858 dst dmz-1:165.236.132.176/10324 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 10324
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown... | Explain this syslog message |
<164>Feb 01 2023 07:14:56: %ASA-4-106023: Deny tcp src outside:166.185.80.55/44858 dst dmz-1:94.224.178.33/10324 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 10324,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",... | Create a JSON artifact from the message |
<164>Feb 01 2023 07:14:56: %ASA-4-106023: Deny tcp src outside:166.185.80.55/44858 dst dmz-1:94.224.178.33/10324 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Feb 01 2023 07:14:56: %ASA-4-106023: Deny tcp src outside:166.185.80.55/44858 dst dmz-1:94.224.178.33/10324 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 10324
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown... | Explain this syslog message |
<164>Feb 01 2023 07:14:56: %ASA-4-106023: Deny tcp src outside:63.164.7.162/44858 dst dmz-1:79.197.220.94/10324 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 10324,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",... | Create a JSON artifact from the message |
<164>Feb 01 2023 07:14:56: %ASA-4-106023: Deny tcp src outside:63.164.7.162/44858 dst dmz-1:79.197.220.94/10324 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Feb 01 2023 07:14:56: %ASA-4-106023: Deny tcp src outside:63.164.7.162/44858 dst dmz-1:79.197.220.94/10324 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 10324
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown... | Explain this syslog message |
<164>Feb 01 2023 07:15:00: %ASA-4-106023: Deny tcp src outside:254.34.154.211/54154 dst dmz-1:155.250.232.254/7778 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 7778,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Feb 01 2023 07:15:00: %ASA-4-106023: Deny tcp src outside:254.34.154.211/54154 dst dmz-1:155.250.232.254/7778 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Feb 01 2023 07:15:00: %ASA-4-106023: Deny tcp src outside:254.34.154.211/54154 dst dmz-1:155.250.232.254/7778 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 7778
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
... | Explain this syslog message |
<164>Feb 01 2023 07:15:00: %ASA-4-106023: Deny tcp src outside:112.219.117.89/54154 dst dmz-1:86.62.66.132/7778 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 7778,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Feb 01 2023 07:15:00: %ASA-4-106023: Deny tcp src outside:112.219.117.89/54154 dst dmz-1:86.62.66.132/7778 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Feb 01 2023 07:15:00: %ASA-4-106023: Deny tcp src outside:112.219.117.89/54154 dst dmz-1:86.62.66.132/7778 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 7778
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
... | Explain this syslog message |
<164>Feb 01 2023 07:14:59: %ASA-4-106023: Deny tcp src outside:75.32.77.168/60237 dst dmz-1:194.215.229.23/23 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Feb 01 2023 07:14:59: %ASA-4-106023: Deny tcp src outside:75.32.77.168/60237 dst dmz-1:194.215.229.23/23 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Feb 01 2023 07:14:59: %ASA-4-106023: Deny tcp src outside:75.32.77.168/60237 dst dmz-1:194.215.229.23/23 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
se... | Explain this syslog message |
<164>Feb 01 2023 07:14:59: %ASA-4-106023: Deny tcp src outside:26.66.23.28/60237 dst dmz-1:221.99.222.130/23 by access-group "outside_access_in" [0x0, 0x0]
| {
"priority": 164,
"senderhost": "10.0.0.1",
"serverport": 23,
"severitylabel": "warning",
"tags": [
"cisco_asa_deny",
"deny",
"cisco_asa",
"firewall_action"
],
"productids": [
17,
0
],
"severitycode": 4,
"sourceinfo": "unknown",
... | Create a JSON artifact from the message |
<164>Feb 01 2023 07:14:59: %ASA-4-106023: Deny tcp src outside:26.66.23.28/60237 dst dmz-1:221.99.222.130/23 by access-group "outside_access_in" [0x0, 0x0]
| Product: ASA Firewall
Vendor: Cisco | Identify this syslog message |
<164>Feb 01 2023 07:14:59: %ASA-4-106023: Deny tcp src outside:26.66.23.28/60237 dst dmz-1:221.99.222.130/23 by access-group "outside_access_in" [0x0, 0x0]
| This is a syslog message from a product called ASA Firewall by Cisco. The following fields were extracted from the message:
priority: 164
senderhost: 10.0.0.1
serverport: 23
severitylabel: warning
tags: ['cisco_asa_deny', 'deny', 'cisco_asa', 'firewall_action']
productids: [17, 0]
severitycode: 4
sourceinfo: unknown
se... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659365261.120528559 NORDC_MX400_1 flows src=17.212.235.179 dst=58.216.0.110 protocol=tcp sport=65504 dport=25 pattern: 1 dst 58.216.0.110 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659365261.120528559 NORDC_MX400_1 flows src=17.212.235.179... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659365261.120528559 NORDC_MX400_1 flows src=17.212.235.179 dst=58.216.0.110 protocol=tcp sport=65504 dport=25 pattern: 1 dst 58.216.0.110 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659365261.120528559 NORDC_MX400_1 flows src=17.212.235.179 dst=58.216.0.110 protocol=tcp sport=65504 dport=25 pattern: 1 dst 58.216.0.110 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 65504
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659365261.120528559 NORDC_MX400_1 flows src=51.64.255.207 dst=20.149.137.179 protocol=tcp sport=65504 dport=25 pattern: 1 dst 20.149.137.179 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659365261.120528559 NORDC_MX400_1 flows src=51.64.255.207 ... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659365261.120528559 NORDC_MX400_1 flows src=51.64.255.207 dst=20.149.137.179 protocol=tcp sport=65504 dport=25 pattern: 1 dst 20.149.137.179 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659365261.120528559 NORDC_MX400_1 flows src=51.64.255.207 dst=20.149.137.179 protocol=tcp sport=65504 dport=25 pattern: 1 dst 20.149.137.179 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 65504
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659365260.455745303 NORDC_MX400_1 flows src=118.64.2.183 dst=182.159.146.45 protocol=tcp sport=6376 dport=25 pattern: 1 dst 182.159.146.45 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659365260.455745303 NORDC_MX400_1 flows src=118.64.2.183 d... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659365260.455745303 NORDC_MX400_1 flows src=118.64.2.183 dst=182.159.146.45 protocol=tcp sport=6376 dport=25 pattern: 1 dst 182.159.146.45 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659365260.455745303 NORDC_MX400_1 flows src=118.64.2.183 dst=182.159.146.45 protocol=tcp sport=6376 dport=25 pattern: 1 dst 182.159.146.45 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6376
protocol: 6
streamN... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659365260.455745303 NORDC_MX400_1 flows src=77.214.154.170 dst=11.136.102.161 protocol=tcp sport=6376 dport=25 pattern: 1 dst 11.136.102.161 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659365260.455745303 NORDC_MX400_1 flows src=77.214.154.170... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659365260.455745303 NORDC_MX400_1 flows src=77.214.154.170 dst=11.136.102.161 protocol=tcp sport=6376 dport=25 pattern: 1 dst 11.136.102.161 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659365260.455745303 NORDC_MX400_1 flows src=77.214.154.170 dst=11.136.102.161 protocol=tcp sport=6376 dport=25 pattern: 1 dst 11.136.102.161 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6376
protocol: 6
streamN... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659365261.018650621 NORDC_MX400_1 flows src=170.47.134.168 dst=5.9.92.229 protocol=tcp sport=52385 dport=25 pattern: 1 dst 5.9.92.229 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659365261.018650621 NORDC_MX400_1 flows src=170.47.134.168... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659365261.018650621 NORDC_MX400_1 flows src=170.47.134.168 dst=5.9.92.229 protocol=tcp sport=52385 dport=25 pattern: 1 dst 5.9.92.229 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659365261.018650621 NORDC_MX400_1 flows src=170.47.134.168 dst=5.9.92.229 protocol=tcp sport=52385 dport=25 pattern: 1 dst 5.9.92.229 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 52385
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659365261.018650621 NORDC_MX400_1 flows src=218.63.61.133 dst=163.191.7.129 protocol=tcp sport=52385 dport=25 pattern: 1 dst 163.191.7.129 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659365261.018650621 NORDC_MX400_1 flows src=218.63.61.133 ... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659365261.018650621 NORDC_MX400_1 flows src=218.63.61.133 dst=163.191.7.129 protocol=tcp sport=52385 dport=25 pattern: 1 dst 163.191.7.129 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659365261.018650621 NORDC_MX400_1 flows src=218.63.61.133 dst=163.191.7.129 protocol=tcp sport=52385 dport=25 pattern: 1 dst 163.191.7.129 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 52385
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659365261.089820612 NORDC_MX400_1 flows src=115.64.220.224 dst=35.107.60.23 protocol=tcp sport=6092 dport=25 pattern: 1 dst 35.107.60.23 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659365261.089820612 NORDC_MX400_1 flows src=115.64.220.224... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659365261.089820612 NORDC_MX400_1 flows src=115.64.220.224 dst=35.107.60.23 protocol=tcp sport=6092 dport=25 pattern: 1 dst 35.107.60.23 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659365261.089820612 NORDC_MX400_1 flows src=115.64.220.224 dst=35.107.60.23 protocol=tcp sport=6092 dport=25 pattern: 1 dst 35.107.60.23 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6092
protocol: 6
streamN... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659365261.089820612 NORDC_MX400_1 flows src=139.94.70.72 dst=18.63.228.190 protocol=tcp sport=6092 dport=25 pattern: 1 dst 18.63.228.190 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659365261.089820612 NORDC_MX400_1 flows src=139.94.70.72 d... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659365261.089820612 NORDC_MX400_1 flows src=139.94.70.72 dst=18.63.228.190 protocol=tcp sport=6092 dport=25 pattern: 1 dst 18.63.228.190 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659365261.089820612 NORDC_MX400_1 flows src=139.94.70.72 dst=18.63.228.190 protocol=tcp sport=6092 dport=25 pattern: 1 dst 18.63.228.190 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 6092
protocol: 6
streamN... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659365261.120528559 NORDC_MX400_1 flows src=212.166.120.55 dst=22.10.54.83 protocol=tcp sport=65504 dport=25 pattern: 1 dst 22.10.54.83 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659365261.120528559 NORDC_MX400_1 flows src=212.166.120.55... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659365261.120528559 NORDC_MX400_1 flows src=212.166.120.55 dst=22.10.54.83 protocol=tcp sport=65504 dport=25 pattern: 1 dst 22.10.54.83 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659365261.120528559 NORDC_MX400_1 flows src=212.166.120.55 dst=22.10.54.83 protocol=tcp sport=65504 dport=25 pattern: 1 dst 22.10.54.83 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 65504
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659365261.120528559 NORDC_MX400_1 flows src=158.116.75.155 dst=240.132.126.228 protocol=tcp sport=65504 dport=25 pattern: 1 dst 240.132.126.228 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659365261.120528559 NORDC_MX400_1 flows src=158.116.75.155... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659365261.120528559 NORDC_MX400_1 flows src=158.116.75.155 dst=240.132.126.228 protocol=tcp sport=65504 dport=25 pattern: 1 dst 240.132.126.228 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659365261.120528559 NORDC_MX400_1 flows src=158.116.75.155 dst=240.132.126.228 protocol=tcp sport=65504 dport=25 pattern: 1 dst 240.132.126.228 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 65504
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659361955.807886735 NORDC_MX400_1 flows src=181.127.165.51 dst=235.7.183.24 protocol=tcp sport=50272 dport=25 pattern: 1 dst 235.7.183.24 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659361955.807886735 NORDC_MX400_1 flows src=181.127.165.51... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659361955.807886735 NORDC_MX400_1 flows src=181.127.165.51 dst=235.7.183.24 protocol=tcp sport=50272 dport=25 pattern: 1 dst 235.7.183.24 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659361955.807886735 NORDC_MX400_1 flows src=181.127.165.51 dst=235.7.183.24 protocol=tcp sport=50272 dport=25 pattern: 1 dst 235.7.183.24 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 50272
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659361955.807886735 NORDC_MX400_1 flows src=18.254.172.253 dst=135.4.109.27 protocol=tcp sport=50272 dport=25 pattern: 1 dst 135.4.109.27 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659361955.807886735 NORDC_MX400_1 flows src=18.254.172.253... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659361955.807886735 NORDC_MX400_1 flows src=18.254.172.253 dst=135.4.109.27 protocol=tcp sport=50272 dport=25 pattern: 1 dst 135.4.109.27 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659361955.807886735 NORDC_MX400_1 flows src=18.254.172.253 dst=135.4.109.27 protocol=tcp sport=50272 dport=25 pattern: 1 dst 135.4.109.27 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 50272
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659361955.807886735 NORDC_MX400_1 flows src=111.116.133.213 dst=2.222.158.6 protocol=tcp sport=50272 dport=25 pattern: 1 dst 2.222.158.6 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659361955.807886735 NORDC_MX400_1 flows src=111.116.133.21... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659361955.807886735 NORDC_MX400_1 flows src=111.116.133.213 dst=2.222.158.6 protocol=tcp sport=50272 dport=25 pattern: 1 dst 2.222.158.6 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659361955.807886735 NORDC_MX400_1 flows src=111.116.133.213 dst=2.222.158.6 protocol=tcp sport=50272 dport=25 pattern: 1 dst 2.222.158.6 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 50272
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659361955.807886735 NORDC_MX400_1 flows src=243.19.168.27 dst=65.14.62.235 protocol=tcp sport=50272 dport=25 pattern: 1 dst 65.14.62.235 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659361955.807886735 NORDC_MX400_1 flows src=243.19.168.27 ... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659361955.807886735 NORDC_MX400_1 flows src=243.19.168.27 dst=65.14.62.235 protocol=tcp sport=50272 dport=25 pattern: 1 dst 65.14.62.235 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659361955.807886735 NORDC_MX400_1 flows src=243.19.168.27 dst=65.14.62.235 protocol=tcp sport=50272 dport=25 pattern: 1 dst 65.14.62.235 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 50272
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659361956.341677521 NORDC_MX400_1 flows src=85.42.234.41 dst=246.1.78.212 protocol=tcp sport=38177 dport=25 pattern: 1 dst 246.1.78.212 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659361956.341677521 NORDC_MX400_1 flows src=85.42.234.41 d... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659361956.341677521 NORDC_MX400_1 flows src=85.42.234.41 dst=246.1.78.212 protocol=tcp sport=38177 dport=25 pattern: 1 dst 246.1.78.212 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659361956.341677521 NORDC_MX400_1 flows src=85.42.234.41 dst=246.1.78.212 protocol=tcp sport=38177 dport=25 pattern: 1 dst 246.1.78.212 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 38177
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659361956.341677521 NORDC_MX400_1 flows src=58.124.239.91 dst=10.27.139.72 protocol=tcp sport=38177 dport=25 pattern: 1 dst 10.27.139.72 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659361956.341677521 NORDC_MX400_1 flows src=58.124.239.91 ... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659361956.341677521 NORDC_MX400_1 flows src=58.124.239.91 dst=10.27.139.72 protocol=tcp sport=38177 dport=25 pattern: 1 dst 10.27.139.72 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659361956.341677521 NORDC_MX400_1 flows src=58.124.239.91 dst=10.27.139.72 protocol=tcp sport=38177 dport=25 pattern: 1 dst 10.27.139.72 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 38177
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659361956.341688219 NORDC_MX400_1 flows src=103.154.178.101 dst=75.179.16.16 protocol=tcp sport=46688 dport=25 pattern: 1 dst 75.179.16.16 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659361956.341688219 NORDC_MX400_1 flows src=103.154.178.10... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659361956.341688219 NORDC_MX400_1 flows src=103.154.178.101 dst=75.179.16.16 protocol=tcp sport=46688 dport=25 pattern: 1 dst 75.179.16.16 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659361956.341688219 NORDC_MX400_1 flows src=103.154.178.101 dst=75.179.16.16 protocol=tcp sport=46688 dport=25 pattern: 1 dst 75.179.16.16 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 46688
protocol: 6
stream... | Explain this syslog message |
<134>Original Address=192.168.2.253 1 1659361956.341688219 NORDC_MX400_1 flows src=47.194.162.97 dst=173.196.104.213 protocol=tcp sport=46688 dport=25 pattern: 1 dst 173.196.104.213 | {
"senderhost": "192.168.2.250",
"serverport": 25,
"tags": [
"deny",
"meraki",
"flow"
],
"productids": [
26,
0
],
"sourceinfo": "unknown",
"message": "<134>Original Address=192.168.2.253 1 1659361956.341688219 NORDC_MX400_1 flows src=47.194.162.97 ... | Create a JSON artifact from the message |
<134>Original Address=192.168.2.253 1 1659361956.341688219 NORDC_MX400_1 flows src=47.194.162.97 dst=173.196.104.213 protocol=tcp sport=46688 dport=25 pattern: 1 dst 173.196.104.213 | Product: Meraki
Vendor: Cisco | Identify this syslog message |
<134>Original Address=192.168.2.253 1 1659361956.341688219 NORDC_MX400_1 flows src=47.194.162.97 dst=173.196.104.213 protocol=tcp sport=46688 dport=25 pattern: 1 dst 173.196.104.213 | This is a syslog message from a product called Meraki by Cisco. The following fields were extracted from the message:
senderhost: 192.168.2.250
serverport: 25
tags: ['deny', 'meraki', 'flow']
productids: [26, 0]
sourceinfo: unknown
action: block
sensitivity: normal
messagetype: flow
clientport: 46688
protocol: 6
stream... | Explain this syslog message |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.