{"cmd":"dmesg | tail -n 12","output":"[    33134.777777] IPv4: martian source 192.0.2.81 from wlan0, on dev eth0\n[    27746.888888] audit: type=1400 apparmor=\"DENIED\" operation=\"open\" profile=\"usr.bin.python3\" name=\"/tmp/.6628\" pid=28470 comm=\"python3\"\n[     7640.123456] TCP: request_sock_TCP: Possible SYN flooding on port 80. Sending cookies.\n[     7186.123456] TCP: request_sock_TCP: Possible SYN flooding on port 80. Sending cookies.\n[    29198.888888] audit: type=1400 apparmor=\"DENIED\" operation=\"open\" profile=\"usr.sbin.nginx\" name=\"/tmp/.9972\" pid=11743 comm=\"bash\"\n[    42818.123456] TCP: request_sock_TCP: Possible SYN flooding on port 22. Sending cookies.\n[     6366.123456] TCP: request_sock_TCP: Possible SYN flooding on port 22. Sending cookies.\n[    18685.888888] audit: type=1400 apparmor=\"DENIED\" operation=\"open\" profile=\"usr.bin.man\" name=\"/tmp/.3117\" pid=3978 comm=\"python3\"\n[    21021.123456] TCP: request_sock_TCP: Possible SYN flooding on port 80. Sending cookies.\n[    39537.123456] TCP: request_sock_TCP: Possible SYN flooding on port 80. Sending cookies.\n[    12325.123456] TCP: request_sock_TCP: Possible SYN flooding on port 80. Sending cookies.\n[    33640.654321] nf_conntrack: table full, dropping packet.\n"}