{"cmd":"dmesg | tail -n 12","output":"[    40068.888888] audit: type=1400 apparmor=\"DENIED\" operation=\"open\" profile=\"usr.bin.python3\" name=\"/tmp/.4360\" pid=38322 comm=\"curl\"\n[    10457.123456] TCP: request_sock_TCP: Possible SYN flooding on port 80. Sending cookies.\n[    44914.888888] audit: type=1400 apparmor=\"DENIED\" operation=\"open\" profile=\"usr.bin.man\" name=\"/tmp/.6858\" pid=9074 comm=\"python3\"\n[    12297.654321] nf_conntrack: table full, dropping packet.\n[    16193.654321] nf_conntrack: table full, dropping packet.\n[    17530.777777] IPv4: martian source 198.51.100.239 from lo, on dev eth0\n[    47381.654321] nf_conntrack: table full, dropping packet.\n[    23349.777777] IPv4: martian source 198.51.100.239 from lo, on dev wlan0\n[    16888.777777] IPv4: martian source 198.51.100.239 from eth0, on dev eth0\n[    19826.123456] TCP: request_sock_TCP: Possible SYN flooding on port 443. Sending cookies.\n[    17772.777777] IPv4: martian source 198.51.100.239 from wlan0, on dev wlan0\n[    17225.888888] audit: type=1400 apparmor=\"DENIED\" operation=\"open\" profile=\"usr.bin.man\" name=\"/tmp/.6982\" pid=22824 comm=\"python3\"\n[    37512.654321] nf_conntrack: table full, dropping packet.\n"}