{"cmd":"dmesg | tail -n 12","output":"[    23822.123456] TCP: request_sock_TCP: Possible SYN flooding on port 443. Sending cookies.\n[    30502.654321] nf_conntrack: table full, dropping packet.\n[    43227.123456] TCP: request_sock_TCP: Possible SYN flooding on port 443. Sending cookies.\n[    19168.888888] audit: type=1400 apparmor=\"DENIED\" operation=\"open\" profile=\"usr.bin.man\" name=\"/tmp/.3044\" pid=12389 comm=\"bash\"\n[     7923.123456] TCP: request_sock_TCP: Possible SYN flooding on port 443. Sending cookies.\n[    19316.123456] TCP: request_sock_TCP: Possible SYN flooding on port 22. Sending cookies.\n[    35197.777777] IPv4: martian source 198.51.100.51 from wlan0, on dev wlan0\n[    33608.123456] TCP: request_sock_TCP: Possible SYN flooding on port 22. Sending cookies.\n[    33904.888888] audit: type=1400 apparmor=\"DENIED\" operation=\"open\" profile=\"usr.bin.man\" name=\"/tmp/.4968\" pid=11291 comm=\"bash\"\n[     4080.654321] nf_conntrack: table full, dropping packet.\n[    21182.123456] TCP: request_sock_TCP: Possible SYN flooding on port 80. Sending cookies.\n[    15010.888888] audit: type=1400 apparmor=\"DENIED\" operation=\"open\" profile=\"usr.bin.man\" name=\"/tmp/.9411\" pid=7625 comm=\"bash\"\n[    41915.123456] TCP: request_sock_TCP: Possible SYN flooding on port 443. Sending cookies.\n[    19514.888888] audit: type=1400 apparmor=\"DENIED\" operation=\"open\" profile=\"usr.bin.python3\" name=\"/tmp/.4139\" pid=4878 comm=\"python3\"\n[    19901.888888] audit: type=1400 apparmor=\"DENIED\" operation=\"open\" profile=\"usr.bin.man\" name=\"/tmp/.5330\" pid=24414 comm=\"curl\"\n[    25352.888888] audit: type=1400 apparmor=\"DENIED\" operation=\"open\" profile=\"usr.sbin.nginx\" name=\"/tmp/.7016\" pid=39972 comm=\"python3\"\n"}