Edit tour
Linux
Analysis Report
IvJe5h7Efy.elf
Overview
General Information
Sample Name: | IvJe5h7Efy.elf |
Original Sample Name: | 731618d9fa4c82c0bb707fcad67e2117.elf |
Analysis ID: | 1288252 |
MD5: | 731618d9fa4c82c0bb707fcad67e2117 |
SHA1: | e2a3c1e9270ceeeeddbd5c5f058acf2e23713fbb |
SHA256: | 323f6a2c6934f6c9c46deb0e4d5a19162ff27ae4f0b65995248654c1e0a6734e |
Tags: | 64elfgafgyt |
Infos: |
Detection
Mirai
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Signatures
Yara detected Mirai
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Snort IDS alert for network traffic
Sample deletes itself
Sample is packed with UPX
Uses known network protocols on non-standard ports
Machine Learning detection for sample
Sample tries to kill multiple processes (SIGKILL)
Sample contains only a LOAD segment without any section mappings
Yara signature match
Detected TCP or UDP traffic on non-standard ports
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
ELF contains segments with high entropy indicating compressed/encrypted content
HTTP GET or POST without a user agent
Classification
Analysis Advice
Some HTTP requests failed (404). It is likely that the sample will exhibit less behavior. |
Joe Sandbox Version: | 38.0.0 Beryl |
Analysis ID: | 1288252 |
Start date and time: | 2023-08-09 07:14:09 +02:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 6m 36s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11) |
Analysis Mode: | default |
Sample file name: | IvJe5h7Efy.elf |
Original Sample Name: | 731618d9fa4c82c0bb707fcad67e2117.elf |
Detection: | MAL |
Classification: | mal100.spre.troj.evad.linELF@0/0@50/0 |
- Report size exceeded maximum capacity and may have missing network information.
- VT rate limit hit for: IvJe5h7Efy.elf
Command: | /tmp/IvJe5h7Efy.elf |
PID: | 6222 |
Exit Code: | 0 |
Exit Code Info: | |
Killed: | False |
Standard Output: | VagneRHere |
Standard Error: |
- system is lnxubuntu20
- IvJe5h7Efy.elf New Fork (PID: 6223, Parent: 6222)
- IvJe5h7Efy.elf New Fork (PID: 6224, Parent: 6223)
- IvJe5h7Efy.elf New Fork (PID: 6225, Parent: 6223)
- IvJe5h7Efy.elf New Fork (PID: 6226, Parent: 6223)
- IvJe5h7Efy.elf New Fork (PID: 6227, Parent: 6223)
- IvJe5h7Efy.elf New Fork (PID: 6228, Parent: 6223)
- IvJe5h7Efy.elf New Fork (PID: 6230, Parent: 6223)
- IvJe5h7Efy.elf New Fork (PID: 6231, Parent: 6223)
- IvJe5h7Efy.elf New Fork (PID: 6232, Parent: 6223)
- IvJe5h7Efy.elf New Fork (PID: 6233, Parent: 6223)
- IvJe5h7Efy.elf New Fork (PID: 6234, Parent: 6223)
- IvJe5h7Efy.elf New Fork (PID: 6235, Parent: 6223)
- IvJe5h7Efy.elf New Fork (PID: 6236, Parent: 6223)
- IvJe5h7Efy.elf New Fork (PID: 6237, Parent: 6223)
- IvJe5h7Efy.elf New Fork (PID: 6238, Parent: 6223)
- IvJe5h7Efy.elf New Fork (PID: 6239, Parent: 6223)
- IvJe5h7Efy.elf New Fork (PID: 6240, Parent: 6223)
- IvJe5h7Efy.elf New Fork (PID: 6241, Parent: 6223)
- IvJe5h7Efy.elf New Fork (PID: 6242, Parent: 6223)
- IvJe5h7Efy.elf New Fork (PID: 6243, Parent: 6223)
- IvJe5h7Efy.elf New Fork (PID: 6244, Parent: 6223)
- IvJe5h7Efy.elf New Fork (PID: 6245, Parent: 6223)
- IvJe5h7Efy.elf New Fork (PID: 6246, Parent: 6223)
- IvJe5h7Efy.elf New Fork (PID: 6247, Parent: 6223)
- IvJe5h7Efy.elf New Fork (PID: 6248, Parent: 6223)
- IvJe5h7Efy.elf New Fork (PID: 6249, Parent: 6223)
- IvJe5h7Efy.elf New Fork (PID: 6250, Parent: 6223)
- IvJe5h7Efy.elf New Fork (PID: 6251, Parent: 6223)
- IvJe5h7Efy.elf New Fork (PID: 6252, Parent: 6223)
- IvJe5h7Efy.elf New Fork (PID: 6253, Parent: 6223)
- IvJe5h7Efy.elf New Fork (PID: 6254, Parent: 6223)
- IvJe5h7Efy.elf New Fork (PID: 6255, Parent: 6223)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Mirai | Mirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world. | No Attribution |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Mirai_12 | Yara detected Mirai | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Mirai_8 | Yara detected Mirai | Joe Security | ||
Linux_Trojan_Gafgyt_9e9530a7 | unknown | unknown |
| |
Linux_Trojan_Gafgyt_807911a2 | unknown | unknown |
| |
Linux_Trojan_Gafgyt_d4227dbf | unknown | unknown |
| |
Linux_Trojan_Gafgyt_620087b9 | unknown | unknown |
| |
Click to see the 268 entries |
Timestamp: | 192.168.2.2389.161.156.17653964802030092 08/09/23-07:15:21.913982 |
SID: | 2030092 |
Source Port: | 53964 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2331.200.250.6754564802030092 08/09/23-07:15:47.395384 |
SID: | 2030092 |
Source Port: | 54564 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23172.245.250.17836096802030092 08/09/23-07:15:11.663242 |
SID: | 2030092 |
Source Port: | 36096 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2313.115.229.20847006802030092 08/09/23-07:15:25.487474 |
SID: | 2030092 |
Source Port: | 47006 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.57.145.24947376802030092 08/09/23-07:15:51.547046 |
SID: | 2030092 |
Source Port: | 47376 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23129.213.136.14852074802030092 08/09/23-07:15:25.487596 |
SID: | 2030092 |
Source Port: | 52074 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23192.185.187.14952802802030092 08/09/23-07:15:04.530879 |
SID: | 2030092 |
Source Port: | 52802 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2369.67.99.4141066802030092 08/09/23-07:15:15.439387 |
SID: | 2030092 |
Source Port: | 41066 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23185.63.128.11443636802030092 08/09/23-07:15:40.197657 |
SID: | 2030092 |
Source Port: | 43636 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23165.186.119.2437126802030092 08/09/23-07:16:20.147275 |
SID: | 2030092 |
Source Port: | 37126 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23173.236.5.20136164802030092 08/09/23-07:15:51.609855 |
SID: | 2030092 |
Source Port: | 36164 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23207.195.233.12933058802030092 08/09/23-07:16:28.882553 |
SID: | 2030092 |
Source Port: | 33058 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2331.136.178.11635310802030092 08/09/23-07:16:58.944132 |
SID: | 2030092 |
Source Port: | 35310 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23191.61.212.12335706528692027339 08/09/23-07:15:45.541166 |
SID: | 2027339 |
Source Port: | 35706 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23107.187.223.21956412802030092 08/09/23-07:16:10.185965 |
SID: | 2030092 |
Source Port: | 56412 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.57.73.16758362802030092 08/09/23-07:15:47.123393 |
SID: | 2030092 |
Source Port: | 58362 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2338.153.214.11355246802030092 08/09/23-07:16:36.203340 |
SID: | 2030092 |
Source Port: | 55246 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23189.194.12.16657114802030092 08/09/23-07:16:47.509509 |
SID: | 2030092 |
Source Port: | 57114 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2386.124.60.7853688802030092 08/09/23-07:15:21.990164 |
SID: | 2030092 |
Source Port: | 53688 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2341.221.201.9340340802030092 08/09/23-07:16:05.864610 |
SID: | 2030092 |
Source Port: | 40340 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2318.244.115.17937676802030092 08/09/23-07:16:53.494305 |
SID: | 2030092 |
Source Port: | 37676 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.235.101.154.22334088802030092 08/09/23-07:16:56.410406 |
SID: | 2030092 |
Source Port: | 34088 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2377.130.240.10838292802030092 08/09/23-07:15:37.566558 |
SID: | 2030092 |
Source Port: | 38292 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23193.22.255.6944020802030092 08/09/23-07:15:51.511202 |
SID: | 2030092 |
Source Port: | 44020 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.21.124.18246284802030092 08/09/23-07:15:17.740599 |
SID: | 2030092 |
Source Port: | 46284 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23208.89.143.8060216802030092 08/09/23-07:15:07.515234 |
SID: | 2030092 |
Source Port: | 60216 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.101.112.13157120802030092 08/09/23-07:16:50.685540 |
SID: | 2030092 |
Source Port: | 57120 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23157.90.253.14236316802030092 08/09/23-07:16:10.379393 |
SID: | 2030092 |
Source Port: | 36316 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2381.103.196.8559702802030092 08/09/23-07:16:34.531425 |
SID: | 2030092 |
Source Port: | 59702 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2318.219.218.5335932802030092 08/09/23-07:15:53.684736 |
SID: | 2030092 |
Source Port: | 35932 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23103.42.39.20640478802030092 08/09/23-07:15:34.521199 |
SID: | 2030092 |
Source Port: | 40478 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2318.231.154.22651220802030092 08/09/23-07:16:25.782308 |
SID: | 2030092 |
Source Port: | 51220 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.18.230.12155814802030092 08/09/23-07:15:33.961757 |
SID: | 2030092 |
Source Port: | 55814 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2346.101.128.12843254802030092 08/09/23-07:15:15.458018 |
SID: | 2030092 |
Source Port: | 43254 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23191.61.189.18838834528692027339 08/09/23-07:15:45.541191 |
SID: | 2027339 |
Source Port: | 38834 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2347.96.11.17035134802030092 08/09/23-07:15:50.150394 |
SID: | 2030092 |
Source Port: | 35134 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23167.82.67.18143074802030092 08/09/23-07:16:36.310155 |
SID: | 2030092 |
Source Port: | 43074 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23190.55.86.9636850802030092 08/09/23-07:15:30.383946 |
SID: | 2030092 |
Source Port: | 36850 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23213.91.182.16046940802030092 08/09/23-07:15:19.598209 |
SID: | 2030092 |
Source Port: | 46940 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23106.138.1.2760204802030092 08/09/23-07:15:51.770176 |
SID: | 2030092 |
Source Port: | 60204 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23123.136.134.18036644802030092 08/09/23-07:16:41.324701 |
SID: | 2030092 |
Source Port: | 36644 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.84.193.20859490802030092 08/09/23-07:16:36.355100 |
SID: | 2030092 |
Source Port: | 59490 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2345.13.30.8754476802030092 08/09/23-07:16:21.993278 |
SID: | 2030092 |
Source Port: | 54476 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2320.68.211.5359226802030092 08/09/23-07:16:58.944178 |
SID: | 2030092 |
Source Port: | 59226 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2389.0.220.18455124802030092 08/09/23-07:15:49.653922 |
SID: | 2030092 |
Source Port: | 55124 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23203.109.255.12740190802030092 08/09/23-07:15:58.777273 |
SID: | 2030092 |
Source Port: | 40190 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23178.238.232.16958684802030092 08/09/23-07:15:02.162540 |
SID: | 2030092 |
Source Port: | 58684 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23208.89.143.8060056802030092 08/09/23-07:15:04.527961 |
SID: | 2030092 |
Source Port: | 60056 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2338.47.228.11747406802030092 08/09/23-07:15:43.835216 |
SID: | 2030092 |
Source Port: | 47406 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23116.171.16.4040992802030092 08/09/23-07:16:10.352591 |
SID: | 2030092 |
Source Port: | 40992 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.102.118.3449772802030092 08/09/23-07:15:34.151013 |
SID: | 2030092 |
Source Port: | 49772 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23217.61.97.24633060802030092 08/09/23-07:16:06.805121 |
SID: | 2030092 |
Source Port: | 33060 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.232.18.139.15148560802030092 08/09/23-07:16:19.889057 |
SID: | 2030092 |
Source Port: | 48560 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23175.178.0.19738934802030092 08/09/23-07:15:40.860070 |
SID: | 2030092 |
Source Port: | 38934 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23199.250.229.5954754802030092 08/09/23-07:15:58.933085 |
SID: | 2030092 |
Source Port: | 54754 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2392.204.208.14735654802030092 08/09/23-07:16:04.868732 |
SID: | 2030092 |
Source Port: | 35654 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2385.187.43.9553158802030092 08/09/23-07:16:32.531884 |
SID: | 2030092 |
Source Port: | 53158 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2378.43.209.10751758802030092 08/09/23-07:16:37.466982 |
SID: | 2030092 |
Source Port: | 51758 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23147.46.209.2243528802030092 08/09/23-07:15:04.524573 |
SID: | 2030092 |
Source Port: | 43528 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.24.236.23247714802030092 08/09/23-07:15:28.574318 |
SID: | 2030092 |
Source Port: | 47714 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2368.191.35.22336860802030092 08/09/23-07:16:06.939690 |
SID: | 2030092 |
Source Port: | 36860 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23191.61.61.4144446528692027339 08/09/23-07:15:49.794635 |
SID: | 2027339 |
Source Port: | 44446 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23104.120.160.8150250802030092 08/09/23-07:16:48.495651 |
SID: | 2030092 |
Source Port: | 50250 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23192.234.160.12252034802030092 08/09/23-07:15:11.611055 |
SID: | 2030092 |
Source Port: | 52034 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23107.189.162.439104802030092 08/09/23-07:15:30.289713 |
SID: | 2030092 |
Source Port: | 39104 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.57.201.12855950802030092 08/09/23-07:16:10.146276 |
SID: | 2030092 |
Source Port: | 55950 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23212.67.221.11044516802030092 08/09/23-07:15:54.890806 |
SID: | 2030092 |
Source Port: | 44516 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23202.126.120.6857764802030092 08/09/23-07:15:30.122233 |
SID: | 2030092 |
Source Port: | 57764 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2369.94.77.1050446802030092 08/09/23-07:15:07.361915 |
SID: | 2030092 |
Source Port: | 50446 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2387.106.2.16057234802030092 08/09/23-07:15:48.351823 |
SID: | 2030092 |
Source Port: | 57234 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.99.213.5637300802030092 08/09/23-07:15:27.527052 |
SID: | 2030092 |
Source Port: | 37300 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23103.89.250.21856316802030092 08/09/23-07:15:40.495406 |
SID: | 2030092 |
Source Port: | 56316 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.86.200.22553228802030092 08/09/23-07:16:20.066430 |
SID: | 2030092 |
Source Port: | 53228 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23203.2.137.10951508802030092 08/09/23-07:15:12.133265 |
SID: | 2030092 |
Source Port: | 51508 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23191.61.237.12639732528692027339 08/09/23-07:16:10.318189 |
SID: | 2027339 |
Source Port: | 39732 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2323.106.34.20248558802030092 08/09/23-07:16:33.558152 |
SID: | 2030092 |
Source Port: | 48558 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23154.201.128.23133666802030092 08/09/23-07:16:32.503533 |
SID: | 2030092 |
Source Port: | 33666 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.116.239.16747754802030092 08/09/23-07:16:15.447538 |
SID: | 2030092 |
Source Port: | 47754 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23195.231.237.24849334802030092 08/09/23-07:15:07.346048 |
SID: | 2030092 |
Source Port: | 49334 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2343.130.155.12734914802030092 08/09/23-07:16:05.865155 |
SID: | 2030092 |
Source Port: | 34914 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2389.250.242.3734878802030092 08/09/23-07:15:56.499736 |
SID: | 2030092 |
Source Port: | 34878 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23197.25.196.20952522802030092 08/09/23-07:15:27.369728 |
SID: | 2030092 |
Source Port: | 52522 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23211.9.57.13140148802030092 08/09/23-07:16:04.950900 |
SID: | 2030092 |
Source Port: | 40148 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23159.203.130.14158490802030092 08/09/23-07:16:36.187295 |
SID: | 2030092 |
Source Port: | 58490 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2338.152.126.650214802030092 08/09/23-07:16:44.570209 |
SID: | 2030092 |
Source Port: | 50214 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23184.27.193.6650412802030092 08/09/23-07:16:38.908751 |
SID: | 2030092 |
Source Port: | 50412 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2368.191.35.22336758802030092 08/09/23-07:16:05.894560 |
SID: | 2030092 |
Source Port: | 36758 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23191.61.228.2039894528692027339 08/09/23-07:16:01.033401 |
SID: | 2027339 |
Source Port: | 39894 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23163.123.42.2745426802030092 08/09/23-07:16:41.467643 |
SID: | 2030092 |
Source Port: | 45426 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23173.19.15.1338494802030092 08/09/23-07:16:41.319479 |
SID: | 2030092 |
Source Port: | 38494 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23183.61.14.2958906802030092 08/09/23-07:15:47.344265 |
SID: | 2030092 |
Source Port: | 58906 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2371.18.255.15459288802030092 08/09/23-07:15:53.861394 |
SID: | 2030092 |
Source Port: | 59288 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23195.58.62.21747070802030092 08/09/23-07:15:07.260048 |
SID: | 2030092 |
Source Port: | 47070 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23114.55.170.6739600802030092 08/09/23-07:15:12.937004 |
SID: | 2030092 |
Source Port: | 39600 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23204.8.47.11448084802030092 08/09/23-07:16:15.337308 |
SID: | 2030092 |
Source Port: | 48084 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.25.89.19255908802030092 08/09/23-07:15:33.944877 |
SID: | 2030092 |
Source Port: | 55908 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23191.61.193.18434054528692027339 08/09/23-07:16:24.080836 |
SID: | 2027339 |
Source Port: | 34054 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23159.192.237.14148470802030092 08/09/23-07:15:04.731397 |
SID: | 2030092 |
Source Port: | 48470 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2378.43.209.10751712802030092 08/09/23-07:16:36.322014 |
SID: | 2030092 |
Source Port: | 51712 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23173.236.222.6941720802030092 08/09/23-07:17:00.434935 |
SID: | 2030092 |
Source Port: | 41720 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23201.211.53.16141048802030092 08/09/23-07:15:58.851163 |
SID: | 2030092 |
Source Port: | 41048 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.19.203.9936592802030092 08/09/23-07:15:21.899798 |
SID: | 2030092 |
Source Port: | 36592 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2371.81.176.1150274802030092 08/09/23-07:16:20.592893 |
SID: | 2030092 |
Source Port: | 50274 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2334.107.157.12357270802030092 08/09/23-07:16:21.999810 |
SID: | 2030092 |
Source Port: | 57270 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23191.61.138.12952228528692027339 08/09/23-07:16:14.820862 |
SID: | 2027339 |
Source Port: | 52228 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2344.209.164.17432868802030092 08/09/23-07:15:07.200693 |
SID: | 2030092 |
Source Port: | 32868 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2380.232.235.25152504802030092 08/09/23-07:16:14.375273 |
SID: | 2030092 |
Source Port: | 52504 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23191.61.125.21441602528692027339 08/09/23-07:16:01.033301 |
SID: | 2027339 |
Source Port: | 41602 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2350.57.203.7933796802030092 08/09/23-07:15:45.503923 |
SID: | 2030092 |
Source Port: | 33796 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2383.191.185.13436126802030092 08/09/23-07:15:45.348485 |
SID: | 2030092 |
Source Port: | 36126 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23185.255.135.15844226802030092 08/09/23-07:16:14.182015 |
SID: | 2030092 |
Source Port: | 44226 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23119.153.112.13658920802030092 08/09/23-07:16:31.631417 |
SID: | 2030092 |
Source Port: | 58920 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2371.82.45.5735784802030092 08/09/23-07:15:19.732941 |
SID: | 2030092 |
Source Port: | 35784 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.73.208.7342094802030092 08/09/23-07:16:08.756515 |
SID: | 2030092 |
Source Port: | 42094 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2345.151.113.23540360802030092 08/09/23-07:16:25.450503 |
SID: | 2030092 |
Source Port: | 40360 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2373.77.34.23749766802030092 08/09/23-07:15:18.775261 |
SID: | 2030092 |
Source Port: | 49766 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23184.86.96.23335462802030092 08/09/23-07:17:00.625549 |
SID: | 2030092 |
Source Port: | 35462 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2354.192.164.19160858802030092 08/09/23-07:15:04.790575 |
SID: | 2030092 |
Source Port: | 60858 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23202.83.163.3450856802030092 08/09/23-07:15:18.591939 |
SID: | 2030092 |
Source Port: | 50856 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.218.135.3740746802030092 08/09/23-07:16:44.142390 |
SID: | 2030092 |
Source Port: | 40746 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.71.214.12751026802030092 08/09/23-07:16:22.093125 |
SID: | 2030092 |
Source Port: | 51026 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23199.231.36.25156838802030092 08/09/23-07:16:16.049948 |
SID: | 2030092 |
Source Port: | 56838 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2338.60.110.18936976802030092 08/09/23-07:15:40.427573 |
SID: | 2030092 |
Source Port: | 36976 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2345.60.159.17949898802030092 08/09/23-07:15:34.312028 |
SID: | 2030092 |
Source Port: | 49898 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23212.236.85.5741214802030092 08/09/23-07:16:33.870538 |
SID: | 2030092 |
Source Port: | 41214 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23151.101.63.24153634802030092 08/09/23-07:16:25.462633 |
SID: | 2030092 |
Source Port: | 53634 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.66.203.21655116802030092 08/09/23-07:15:35.747550 |
SID: | 2030092 |
Source Port: | 55116 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.54.90.4145498802030092 08/09/23-07:15:40.398746 |
SID: | 2030092 |
Source Port: | 45498 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23191.61.207.5143526528692027339 08/09/23-07:15:19.459913 |
SID: | 2027339 |
Source Port: | 43526 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2338.77.18.20137422802030092 08/09/23-07:15:34.156517 |
SID: | 2030092 |
Source Port: | 37422 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23119.3.124.8842672802030092 08/09/23-07:16:31.529899 |
SID: | 2030092 |
Source Port: | 42672 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23191.61.124.24941078528692027339 08/09/23-07:15:37.024488 |
SID: | 2027339 |
Source Port: | 41078 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23128.2.109.11542210802030092 08/09/23-07:15:25.373334 |
SID: | 2030092 |
Source Port: | 42210 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23154.210.26.15038226802030092 08/09/23-07:16:05.156216 |
SID: | 2030092 |
Source Port: | 38226 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.50.222.22355304802030092 08/09/23-07:15:44.016111 |
SID: | 2030092 |
Source Port: | 55304 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.252.237.8951234802030092 08/09/23-07:16:41.712505 |
SID: | 2030092 |
Source Port: | 51234 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2331.192.214.19733516802030092 08/09/23-07:15:51.509891 |
SID: | 2030092 |
Source Port: | 33516 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.24.63.4837692802030092 08/09/23-07:15:21.899708 |
SID: | 2030092 |
Source Port: | 37692 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2334.239.196.9334080802030092 08/09/23-07:16:16.042362 |
SID: | 2030092 |
Source Port: | 34080 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23191.61.103.6451718528692027339 08/09/23-07:16:24.103725 |
SID: | 2027339 |
Source Port: | 51718 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23108.61.191.3350494802030092 08/09/23-07:15:34.143290 |
SID: | 2030092 |
Source Port: | 50494 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23147.47.10.15754696802030092 08/09/23-07:16:46.050117 |
SID: | 2030092 |
Source Port: | 54696 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23193.110.93.19434214802030092 08/09/23-07:15:27.344567 |
SID: | 2030092 |
Source Port: | 34214 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23222.29.46.24948036802030092 08/09/23-07:16:26.998265 |
SID: | 2030092 |
Source Port: | 48036 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2396.17.118.21539186802030092 08/09/23-07:16:36.203562 |
SID: | 2030092 |
Source Port: | 39186 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2354.249.204.15540538802030092 08/09/23-07:15:51.935007 |
SID: | 2030092 |
Source Port: | 40538 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2354.84.72.7253578802030092 08/09/23-07:17:00.553658 |
SID: | 2030092 |
Source Port: | 53578 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23220.135.99.12457408802030092 08/09/23-07:15:16.113787 |
SID: | 2030092 |
Source Port: | 57408 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2335.174.127.22138764802030092 08/09/23-07:15:30.243457 |
SID: | 2030092 |
Source Port: | 38764 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2345.83.6.3039292802030092 08/09/23-07:16:00.410583 |
SID: | 2030092 |
Source Port: | 39292 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.25.146.9360956802030092 08/09/23-07:16:51.635042 |
SID: | 2030092 |
Source Port: | 60956 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23108.156.89.24240848802030092 08/09/23-07:15:27.579352 |
SID: | 2030092 |
Source Port: | 40848 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2320.24.70.4937076802030092 08/09/23-07:16:32.942327 |
SID: | 2030092 |
Source Port: | 37076 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.97.162.19460780802030092 08/09/23-07:17:00.381165 |
SID: | 2030092 |
Source Port: | 60780 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2395.216.196.18743128802030092 08/09/23-07:16:56.377500 |
SID: | 2030092 |
Source Port: | 43128 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2360.251.189.23253786802030092 08/09/23-07:15:45.324470 |
SID: | 2030092 |
Source Port: | 53786 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23189.41.29.18051996802030092 08/09/23-07:15:50.136673 |
SID: | 2030092 |
Source Port: | 51996 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2320.232.0.8250160802030092 08/09/23-07:15:54.960507 |
SID: | 2030092 |
Source Port: | 50160 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23205.216.10.10059602802030092 08/09/23-07:16:45.938074 |
SID: | 2030092 |
Source Port: | 59602 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.203.85.21639788802030092 08/09/23-07:15:27.602577 |
SID: | 2030092 |
Source Port: | 39788 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2334.243.187.22953588802030092 08/09/23-07:16:44.452808 |
SID: | 2030092 |
Source Port: | 53588 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23167.82.67.18143120802030092 08/09/23-07:16:37.452663 |
SID: | 2030092 |
Source Port: | 43120 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2347.105.139.17741464802030092 08/09/23-07:16:07.053084 |
SID: | 2030092 |
Source Port: | 41464 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23181.192.5.7736962802030092 08/09/23-07:16:59.023587 |
SID: | 2030092 |
Source Port: | 36962 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23194.11.196.15043928802030092 08/09/23-07:15:04.408770 |
SID: | 2030092 |
Source Port: | 43928 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2318.164.43.2548470802030092 08/09/23-07:15:25.762340 |
SID: | 2030092 |
Source Port: | 48470 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.72.2.11758044802030092 08/09/23-07:15:48.582391 |
SID: | 2030092 |
Source Port: | 58044 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23180.93.137.2738018802030092 08/09/23-07:16:28.390165 |
SID: | 2030092 |
Source Port: | 38018 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.206.136.22636996802030092 08/09/23-07:15:04.439814 |
SID: | 2030092 |
Source Port: | 36996 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.200.152.19153946802030092 08/09/23-07:16:28.708369 |
SID: | 2030092 |
Source Port: | 53946 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23157.245.110.6844516802030092 08/09/23-07:16:20.230231 |
SID: | 2030092 |
Source Port: | 44516 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23185.181.74.6344526802030092 08/09/23-07:16:17.854302 |
SID: | 2030092 |
Source Port: | 44526 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23107.161.28.22935880802030092 08/09/23-07:16:25.566534 |
SID: | 2030092 |
Source Port: | 35880 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2391.210.170.8454622802030092 08/09/23-07:16:41.386235 |
SID: | 2030092 |
Source Port: | 54622 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2382.185.178.14940126802030092 08/09/23-07:16:48.531265 |
SID: | 2030092 |
Source Port: | 40126 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23164.88.15.18446598802030092 08/09/23-07:15:45.058930 |
SID: | 2030092 |
Source Port: | 46598 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23192.254.153.2646030802030092 08/09/23-07:16:15.595332 |
SID: | 2030092 |
Source Port: | 46030 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2334.210.219.13936478802030092 08/09/23-07:16:36.809284 |
SID: | 2030092 |
Source Port: | 36478 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23184.50.56.19849182802030092 08/09/23-07:16:59.117842 |
SID: | 2030092 |
Source Port: | 49182 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.248.215.16536750802030092 08/09/23-07:15:34.319558 |
SID: | 2030092 |
Source Port: | 36750 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2344.199.21.25055790802030092 08/09/23-07:15:34.163619 |
SID: | 2030092 |
Source Port: | 55790 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23192.155.82.5256162802030092 08/09/23-07:16:16.949484 |
SID: | 2030092 |
Source Port: | 56162 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23185.142.81.22648160802030092 08/09/23-07:16:22.586235 |
SID: | 2030092 |
Source Port: | 48160 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2346.105.100.19544676802030092 08/09/23-07:15:25.406507 |
SID: | 2030092 |
Source Port: | 44676 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.222.208.20544414802030092 08/09/23-07:15:28.714194 |
SID: | 2030092 |
Source Port: | 44414 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23108.138.218.1457618802030092 08/09/23-07:16:44.058037 |
SID: | 2030092 |
Source Port: | 57618 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2371.76.24.21859620802030092 08/09/23-07:15:36.904511 |
SID: | 2030092 |
Source Port: | 59620 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2337.59.57.22959152802030092 08/09/23-07:15:48.379033 |
SID: | 2030092 |
Source Port: | 59152 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23216.131.99.5353340802030092 08/09/23-07:16:00.269395 |
SID: | 2030092 |
Source Port: | 53340 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23165.84.150.12937416802030092 08/09/23-07:15:18.899942 |
SID: | 2030092 |
Source Port: | 37416 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2390.188.14.23855928802030092 08/09/23-07:15:25.469845 |
SID: | 2030092 |
Source Port: | 55928 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23168.188.91.538994802030092 08/09/23-07:15:51.698295 |
SID: | 2030092 |
Source Port: | 38994 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.12.2.23736614802030092 08/09/23-07:16:34.007425 |
SID: | 2030092 |
Source Port: | 36614 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23208.106.221.6637408802030092 08/09/23-07:16:38.692950 |
SID: | 2030092 |
Source Port: | 37408 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.203.75.11834528802030092 08/09/23-07:16:34.795161 |
SID: | 2030092 |
Source Port: | 34528 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23185.208.11.658926802030092 08/09/23-07:16:51.324946 |
SID: | 2030092 |
Source Port: | 58926 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2354.83.203.6156292802030092 08/09/23-07:15:07.512533 |
SID: | 2030092 |
Source Port: | 56292 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2354.86.143.21741584802030092 08/09/23-07:16:06.905371 |
SID: | 2030092 |
Source Port: | 41584 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23212.109.223.20957462802030092 08/09/23-07:16:20.012215 |
SID: | 2030092 |
Source Port: | 57462 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2372.167.224.22439646802030092 08/09/23-07:15:14.411781 |
SID: | 2030092 |
Source Port: | 39646 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2389.223.120.14853390802030092 08/09/23-07:16:50.875879 |
SID: | 2030092 |
Source Port: | 53390 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2364.119.218.12657980802030092 08/09/23-07:15:40.197460 |
SID: | 2030092 |
Source Port: | 57980 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23154.89.85.18937254802030092 08/09/23-07:15:58.960494 |
SID: | 2030092 |
Source Port: | 37254 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23191.61.185.5941792528692027339 08/09/23-07:16:48.686273 |
SID: | 2027339 |
Source Port: | 41792 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2384.95.150.6159402802030092 08/09/23-07:16:56.415135 |
SID: | 2030092 |
Source Port: | 59402 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2351.140.70.7643736802030092 08/09/23-07:15:31.371225 |
SID: | 2030092 |
Source Port: | 43736 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23116.80.8.18952554802030092 08/09/23-07:15:31.469994 |
SID: | 2030092 |
Source Port: | 52554 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2347.251.31.8848662802030092 08/09/23-07:15:31.639160 |
SID: | 2030092 |
Source Port: | 48662 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2350.227.252.5558892802030092 08/09/23-07:15:58.744939 |
SID: | 2030092 |
Source Port: | 58892 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23109.36.70.16056580802030092 08/09/23-07:16:51.656694 |
SID: | 2030092 |
Source Port: | 56580 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23152.92.250.16057520802030092 08/09/23-07:15:07.569197 |
SID: | 2030092 |
Source Port: | 57520 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23191.61.188.11746264528692027339 08/09/23-07:16:24.127108 |
SID: | 2027339 |
Source Port: | 46264 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23216.118.88.5933720802030092 08/09/23-07:15:21.990261 |
SID: | 2030092 |
Source Port: | 33720 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2360.43.149.8059110802030092 08/09/23-07:16:51.981695 |
SID: | 2030092 |
Source Port: | 59110 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.50.33.21837266802030092 08/09/23-07:15:47.506058 |
SID: | 2030092 |
Source Port: | 37266 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2354.84.72.7253644802030092 08/09/23-07:17:01.697685 |
SID: | 2030092 |
Source Port: | 53644 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2345.58.34.22837762802030092 08/09/23-07:15:34.575073 |
SID: | 2030092 |
Source Port: | 37762 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23180.249.70.10160188802030092 08/09/23-07:16:20.760513 |
SID: | 2030092 |
Source Port: | 60188 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23162.240.226.21950220802030092 08/09/23-07:15:58.809223 |
SID: | 2030092 |
Source Port: | 50220 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2337.157.253.8533254802030092 08/09/23-07:16:49.953502 |
SID: | 2030092 |
Source Port: | 33254 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2360.216.0.7360608802030092 08/09/23-07:15:11.663316 |
SID: | 2030092 |
Source Port: | 60608 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23198.177.124.18257988802030092 08/09/23-07:15:31.690122 |
SID: | 2030092 |
Source Port: | 57988 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23217.18.60.2640166802030092 08/09/23-07:15:43.735894 |
SID: | 2030092 |
Source Port: | 40166 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.153.115.17057586802030092 08/09/23-07:16:38.828711 |
SID: | 2030092 |
Source Port: | 57586 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23191.61.183.24556480528692027339 08/09/23-07:16:24.102410 |
SID: | 2027339 |
Source Port: | 56480 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23154.89.85.18937348802030092 08/09/23-07:16:00.987398 |
SID: | 2030092 |
Source Port: | 37348 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2374.219.36.18653460802030092 08/09/23-07:15:14.669444 |
SID: | 2030092 |
Source Port: | 53460 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2324.86.161.334370802030092 08/09/23-07:15:09.095003 |
SID: | 2030092 |
Source Port: | 34370 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2350.116.52.22136518802030092 08/09/23-07:15:56.655797 |
SID: | 2030092 |
Source Port: | 36518 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2334.36.250.22837792802030092 08/09/23-07:15:55.085650 |
SID: | 2030092 |
Source Port: | 37792 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23186.57.29.7343822802030092 08/09/23-07:15:56.717348 |
SID: | 2030092 |
Source Port: | 43822 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2362.28.63.12235850802030092 08/09/23-07:16:45.103249 |
SID: | 2030092 |
Source Port: | 35850 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23168.205.92.16342816802030092 08/09/23-07:17:00.890386 |
SID: | 2030092 |
Source Port: | 42816 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2331.14.14.18233848802030092 08/09/23-07:16:15.315196 |
SID: | 2030092 |
Source Port: | 33848 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23191.61.210.1642518528692027339 08/09/23-07:15:40.277015 |
SID: | 2027339 |
Source Port: | 42518 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23193.9.49.23858248802030092 08/09/23-07:16:32.532015 |
SID: | 2030092 |
Source Port: | 58248 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23112.126.150.941042802030092 08/09/23-07:16:53.219017 |
SID: | 2030092 |
Source Port: | 41042 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23149.104.104.3835304802030092 08/09/23-07:15:28.687785 |
SID: | 2030092 |
Source Port: | 35304 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23154.38.198.12058552802030092 08/09/23-07:15:31.572411 |
SID: | 2030092 |
Source Port: | 58552 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2374.114.88.23833792802030092 08/09/23-07:16:20.231594 |
SID: | 2030092 |
Source Port: | 33792 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.238.217.48.13338586802030092 08/09/23-07:15:09.908625 |
SID: | 2030092 |
Source Port: | 38586 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2384.164.253.3744570802030092 08/09/23-07:15:34.313572 |
SID: | 2030092 |
Source Port: | 44570 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.57.16.20751212802030092 08/09/23-07:16:06.796634 |
SID: | 2030092 |
Source Port: | 51212 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23178.128.106.22545124802030092 08/09/23-07:16:25.740333 |
SID: | 2030092 |
Source Port: | 45124 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2370.98.11.16140078802030092 08/09/23-07:16:59.057384 |
SID: | 2030092 |
Source Port: | 40078 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2386.109.17.21244116802030092 08/09/23-07:15:43.649151 |
SID: | 2030092 |
Source Port: | 44116 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23109.36.60.9558736802030092 08/09/23-07:15:33.980558 |
SID: | 2030092 |
Source Port: | 58736 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2365.8.196.3743154802030092 08/09/23-07:16:06.840361 |
SID: | 2030092 |
Source Port: | 43154 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23134.98.81.22343916802030092 08/09/23-07:16:04.874123 |
SID: | 2030092 |
Source Port: | 43916 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23147.46.8.18360704802030092 08/09/23-07:16:25.683506 |
SID: | 2030092 |
Source Port: | 60704 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23180.151.22.251880802030092 08/09/23-07:16:25.625010 |
SID: | 2030092 |
Source Port: | 51880 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2338.47.228.11747804802030092 08/09/23-07:15:48.090659 |
SID: | 2030092 |
Source Port: | 47804 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2377.242.83.853850802030092 08/09/23-07:15:56.475475 |
SID: | 2030092 |
Source Port: | 53850 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2345.33.118.4653396802030092 08/09/23-07:16:48.722521 |
SID: | 2030092 |
Source Port: | 53396 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23190.133.116.1153376528692027339 08/09/23-07:16:00.363104 |
SID: | 2027339 |
Source Port: | 53376 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23172.247.38.12255242802030092 08/09/23-07:16:28.882913 |
SID: | 2030092 |
Source Port: | 55242 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.20.49.14248350802030092 08/09/23-07:16:41.366653 |
SID: | 2030092 |
Source Port: | 48350 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23168.76.69.6635384802030092 08/09/23-07:15:25.673300 |
SID: | 2030092 |
Source Port: | 35384 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.219.165.9446830802030092 08/09/23-07:15:28.680118 |
SID: | 2030092 |
Source Port: | 46830 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2354.217.157.23258326802030092 08/09/23-07:15:45.106064 |
SID: | 2030092 |
Source Port: | 58326 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2366.198.242.24246276802030092 08/09/23-07:15:31.540232 |
SID: | 2030092 |
Source Port: | 46276 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2347.108.252.23536322802030092 08/09/23-07:15:45.810347 |
SID: | 2030092 |
Source Port: | 36322 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2368.232.242.5939590802030092 08/09/23-07:15:11.610256 |
SID: | 2030092 |
Source Port: | 39590 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2372.246.129.6449954802030092 08/09/23-07:15:55.198685 |
SID: | 2030092 |
Source Port: | 49954 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2320.175.138.11453926802030092 08/09/23-07:16:14.240948 |
SID: | 2030092 |
Source Port: | 53926 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2318.130.130.7236748802030092 08/09/23-07:16:50.859089 |
SID: | 2030092 |
Source Port: | 36748 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23108.156.89.24241862802030092 08/09/23-07:15:43.769406 |
SID: | 2030092 |
Source Port: | 41862 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.44.24.8042504802030092 08/09/23-07:16:56.609395 |
SID: | 2030092 |
Source Port: | 42504 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23198.27.74.4352316802030092 08/09/23-07:17:01.576410 |
SID: | 2030092 |
Source Port: | 52316 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2388.209.247.8555340802030092 08/09/23-07:16:50.854147 |
SID: | 2030092 |
Source Port: | 55340 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23157.230.26.19056114802030092 08/09/23-07:15:18.690073 |
SID: | 2030092 |
Source Port: | 56114 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23220.135.138.14753698802030092 08/09/23-07:16:28.965082 |
SID: | 2030092 |
Source Port: | 53698 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.85.142.18240226802030092 08/09/23-07:15:30.518170 |
SID: | 2030092 |
Source Port: | 40226 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23167.250.51.7342270802030092 08/09/23-07:15:58.619240 |
SID: | 2030092 |
Source Port: | 42270 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23190.104.219.14638512802030092 08/09/23-07:15:46.805105 |
SID: | 2030092 |
Source Port: | 38512 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2334.128.134.24657496802030092 08/09/23-07:16:08.114723 |
SID: | 2030092 |
Source Port: | 57496 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2390.83.181.22551440802030092 08/09/23-07:15:15.454108 |
SID: | 2030092 |
Source Port: | 51440 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23191.61.118.13154750528692027339 08/09/23-07:16:01.022535 |
SID: | 2027339 |
Source Port: | 54750 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2323.41.3.4251516802030092 08/09/23-07:16:41.617746 |
SID: | 2030092 |
Source Port: | 51516 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23162.214.215.22851328802030092 08/09/23-07:16:08.283845 |
SID: | 2030092 |
Source Port: | 51328 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2384.66.232.22734622802030092 08/09/23-07:15:01.159684 |
SID: | 2030092 |
Source Port: | 34622 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2345.236.32.19038778802030092 08/09/23-07:16:25.921355 |
SID: | 2030092 |
Source Port: | 38778 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23191.61.24.11246728528692027339 08/09/23-07:16:11.576473 |
SID: | 2027339 |
Source Port: | 46728 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23155.159.96.10355064802030092 08/09/23-07:15:11.910234 |
SID: | 2030092 |
Source Port: | 55064 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.87.101.6653462802030092 08/09/23-07:15:40.179483 |
SID: | 2030092 |
Source Port: | 53462 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2334.43.7.13051914802030092 08/09/23-07:15:21.970994 |
SID: | 2030092 |
Source Port: | 51914 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2338.47.228.11747244802030092 08/09/23-07:15:40.495312 |
SID: | 2030092 |
Source Port: | 47244 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2366.185.26.13860286802030092 08/09/23-07:16:34.652776 |
SID: | 2030092 |
Source Port: | 60286 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2331.117.145.6032998802030092 08/09/23-07:16:19.907939 |
SID: | 2030092 |
Source Port: | 32998 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23119.6.80.23654514802030092 08/09/23-07:15:46.832353 |
SID: | 2030092 |
Source Port: | 54514 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23203.126.166.2754058802030092 08/09/23-07:15:37.028720 |
SID: | 2030092 |
Source Port: | 54058 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2369.10.59.14655226802030092 08/09/23-07:15:34.145559 |
SID: | 2030092 |
Source Port: | 55226 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2344.200.122.17235276802030092 08/09/23-07:16:20.128607 |
SID: | 2030092 |
Source Port: | 35276 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.86.118.8141456802030092 08/09/23-07:15:54.976139 |
SID: | 2030092 |
Source Port: | 41456 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23202.194.14.3856634802030092 08/09/23-07:15:46.926068 |
SID: | 2030092 |
Source Port: | 56634 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2391.195.29.10552714802030092 08/09/23-07:16:05.758135 |
SID: | 2030092 |
Source Port: | 52714 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2318.67.248.10856868802030092 08/09/23-07:16:34.567266 |
SID: | 2030092 |
Source Port: | 56868 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2338.145.240.9653838802030092 08/09/23-07:16:33.984941 |
SID: | 2030092 |
Source Port: | 53838 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.160.224.23847394802030092 08/09/23-07:15:45.174836 |
SID: | 2030092 |
Source Port: | 47394 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.46.114.17250654802030092 08/09/23-07:16:15.159816 |
SID: | 2030092 |
Source Port: | 50654 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2334.117.77.13550572802030092 08/09/23-07:16:06.788710 |
SID: | 2030092 |
Source Port: | 50572 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23137.184.142.19757288802030092 08/09/23-07:16:31.563628 |
SID: | 2030092 |
Source Port: | 57288 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23190.122.4.5243138528692027339 08/09/23-07:16:00.802363 |
SID: | 2027339 |
Source Port: | 43138 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2338.77.18.20137494802030092 08/09/23-07:15:35.652993 |
SID: | 2030092 |
Source Port: | 37494 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2338.207.92.5556200802030092 08/09/23-07:16:31.459926 |
SID: | 2030092 |
Source Port: | 56200 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23124.207.65.8659292802030092 08/09/23-07:15:07.688769 |
SID: | 2030092 |
Source Port: | 59292 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23131.111.176.23758626802030092 08/09/23-07:16:19.897762 |
SID: | 2030092 |
Source Port: | 58626 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23184.51.224.6756066802030092 08/09/23-07:16:51.658966 |
SID: | 2030092 |
Source Port: | 56066 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2377.207.178.10553610802030092 08/09/23-07:15:18.460381 |
SID: | 2030092 |
Source Port: | 53610 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2351.178.191.6760954802030092 08/09/23-07:15:12.470678 |
SID: | 2030092 |
Source Port: | 60954 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23188.75.131.16258720802030092 08/09/23-07:15:58.530315 |
SID: | 2030092 |
Source Port: | 58720 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2335.244.151.22251962802030092 08/09/23-07:15:26.279288 |
SID: | 2030092 |
Source Port: | 51962 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23198.16.115.1157496802030092 08/09/23-07:16:20.559484 |
SID: | 2030092 |
Source Port: | 57496 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2354.146.249.10853228802030092 08/09/23-07:15:27.403757 |
SID: | 2030092 |
Source Port: | 53228 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2373.6.158.5054152802030092 08/09/23-07:15:51.761584 |
SID: | 2030092 |
Source Port: | 54152 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.7.140.10650752802030092 08/09/23-07:15:12.833262 |
SID: | 2030092 |
Source Port: | 50752 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2335.206.146.2234946802030092 08/09/23-07:16:26.358517 |
SID: | 2030092 |
Source Port: | 34946 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2345.65.165.5351282802030092 08/09/23-07:15:14.761206 |
SID: | 2030092 |
Source Port: | 51282 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23110.40.197.20940306802030092 08/09/23-07:16:06.062694 |
SID: | 2030092 |
Source Port: | 40306 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23213.34.35.18041816802030092 08/09/23-07:15:45.092710 |
SID: | 2030092 |
Source Port: | 41816 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23203.64.95.20760752802030092 08/09/23-07:16:00.544964 |
SID: | 2030092 |
Source Port: | 60752 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2342.81.23.6244404802030092 08/09/23-07:15:48.319624 |
SID: | 2030092 |
Source Port: | 44404 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.218.247.19857828802030092 08/09/23-07:16:06.931581 |
SID: | 2030092 |
Source Port: | 57828 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.208.179.11755280802030092 08/09/23-07:15:07.552469 |
SID: | 2030092 |
Source Port: | 55280 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23153.120.27.24336030802030092 08/09/23-07:15:16.132560 |
SID: | 2030092 |
Source Port: | 36030 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2368.191.35.22336980802030092 08/09/23-07:16:08.723403 |
SID: | 2030092 |
Source Port: | 36980 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.99.216.18144472802030092 08/09/23-07:15:49.882247 |
SID: | 2030092 |
Source Port: | 44472 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23103.211.239.4837178802030092 08/09/23-07:15:13.274026 |
SID: | 2030092 |
Source Port: | 37178 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2373.32.200.1837218802030092 08/09/23-07:15:49.884975 |
SID: | 2030092 |
Source Port: | 37218 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23188.120.232.16432984802030092 08/09/23-07:16:08.530364 |
SID: | 2030092 |
Source Port: | 32984 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2388.70.75.18954616802030092 08/09/23-07:15:45.088730 |
SID: | 2030092 |
Source Port: | 54616 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2393.180.73.5251852802030092 08/09/23-07:16:37.470138 |
SID: | 2030092 |
Source Port: | 51852 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23191.61.167.2347412528692027339 08/09/23-07:15:41.281270 |
SID: | 2027339 |
Source Port: | 47412 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23191.61.60.5652060528692027339 08/09/23-07:15:41.281313 |
SID: | 2027339 |
Source Port: | 52060 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2313.225.26.24052990802030092 08/09/23-07:16:19.941603 |
SID: | 2030092 |
Source Port: | 52990 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2351.38.181.13559054802030092 08/09/23-07:15:02.220097 |
SID: | 2030092 |
Source Port: | 59054 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23198.20.94.10234154802030092 08/09/23-07:16:05.927125 |
SID: | 2030092 |
Source Port: | 34154 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23184.29.28.24055012802030092 08/09/23-07:16:22.109483 |
SID: | 2030092 |
Source Port: | 55012 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23154.89.85.18937230802030092 08/09/23-07:15:58.657640 |
SID: | 2030092 |
Source Port: | 37230 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23128.245.150.10958528802030092 08/09/23-07:15:14.771576 |
SID: | 2030092 |
Source Port: | 58528 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23121.166.207.15733350802030092 08/09/23-07:15:07.340943 |
SID: | 2030092 |
Source Port: | 33350 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23210.154.239.20653924802030092 08/09/23-07:16:56.597139 |
SID: | 2030092 |
Source Port: | 53924 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.45.96.21637072802030092 08/09/23-07:15:04.525074 |
SID: | 2030092 |
Source Port: | 37072 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23199.250.229.5954576802030092 08/09/23-07:15:56.583817 |
SID: | 2030092 |
Source Port: | 54576 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2313.226.238.18138966802030092 08/09/23-07:15:58.630409 |
SID: | 2030092 |
Source Port: | 38966 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2331.136.121.22244438802030092 08/09/23-07:15:18.460232 |
SID: | 2030092 |
Source Port: | 44438 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.235.233.98.7259998802030092 08/09/23-07:16:15.255330 |
SID: | 2030092 |
Source Port: | 59998 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23152.92.16.4150930802030092 08/09/23-07:16:41.424929 |
SID: | 2030092 |
Source Port: | 50930 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23113.50.62.19942728802030092 08/09/23-07:16:45.541172 |
SID: | 2030092 |
Source Port: | 42728 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23202.214.54.14649788802030092 08/09/23-07:16:28.974116 |
SID: | 2030092 |
Source Port: | 49788 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23191.61.216.15457800528692027339 08/09/23-07:16:10.548119 |
SID: | 2027339 |
Source Port: | 57800 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23195.133.57.5160842802030092 08/09/23-07:15:45.306193 |
SID: | 2030092 |
Source Port: | 60842 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2366.228.60.14656044802030092 08/09/23-07:15:15.706940 |
SID: | 2030092 |
Source Port: | 56044 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2344.199.21.25055858802030092 08/09/23-07:15:35.659439 |
SID: | 2030092 |
Source Port: | 55858 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2338.86.129.1959620802030092 08/09/23-07:16:50.956853 |
SID: | 2030092 |
Source Port: | 59620 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23154.12.120.22053132802030092 08/09/23-07:16:36.246707 |
SID: | 2030092 |
Source Port: | 53132 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.198.249.634064802030092 08/09/23-07:15:47.172490 |
SID: | 2030092 |
Source Port: | 34064 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2354.146.243.21152504802030092 08/09/23-07:16:56.455450 |
SID: | 2030092 |
Source Port: | 52504 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.75.109.3046358802030092 08/09/23-07:16:49.955409 |
SID: | 2030092 |
Source Port: | 46358 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23184.85.67.5233240802030092 08/09/23-07:16:58.903554 |
SID: | 2030092 |
Source Port: | 33240 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23192.225.239.16836800802030092 08/09/23-07:15:17.463854 |
SID: | 2030092 |
Source Port: | 36800 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.206.38.7340768802030092 08/09/23-07:16:08.587811 |
SID: | 2030092 |
Source Port: | 40768 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2354.87.112.12550804802030092 08/09/23-07:15:28.676200 |
SID: | 2030092 |
Source Port: | 50804 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.84.242.17241610802030092 08/09/23-07:15:28.341700 |
SID: | 2030092 |
Source Port: | 41610 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2343.224.124.6543620802030092 08/09/23-07:15:54.720890 |
SID: | 2030092 |
Source Port: | 43620 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2327.96.16.14557064802030092 08/09/23-07:16:35.815060 |
SID: | 2030092 |
Source Port: | 57064 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2345.154.77.10637916802030092 08/09/23-07:15:56.499420 |
SID: | 2030092 |
Source Port: | 37916 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2338.152.167.18444992802030092 08/09/23-07:15:04.448663 |
SID: | 2030092 |
Source Port: | 44992 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23103.114.147.19732980802030092 08/09/23-07:16:22.255301 |
SID: | 2030092 |
Source Port: | 32980 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23191.61.165.11953340528692027339 08/09/23-07:16:11.574714 |
SID: | 2027339 |
Source Port: | 53340 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2392.243.26.24736902802030092 08/09/23-07:16:14.155134 |
SID: | 2030092 |
Source Port: | 36902 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2354.87.112.12550866802030092 08/09/23-07:15:30.243319 |
SID: | 2030092 |
Source Port: | 50866 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2386.69.223.18843726802030092 08/09/23-07:15:49.654034 |
SID: | 2030092 |
Source Port: | 43726 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.234.194.54.2458574802030092 08/09/23-07:15:34.306859 |
SID: | 2030092 |
Source Port: | 58574 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.82.199.5537018802030092 08/09/23-07:16:47.350842 |
SID: | 2030092 |
Source Port: | 37018 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23191.61.175.15049268528692027339 08/09/23-07:15:19.459939 |
SID: | 2027339 |
Source Port: | 49268 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23116.80.8.18952480802030092 08/09/23-07:15:30.407239 |
SID: | 2030092 |
Source Port: | 52480 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2346.151.218.8634764802030092 08/09/23-07:16:22.042568 |
SID: | 2030092 |
Source Port: | 34764 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2313.250.155.14833040802030092 08/09/23-07:15:04.596838 |
SID: | 2030092 |
Source Port: | 33040 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23190.134.83.20349732528692027339 08/09/23-07:16:30.417420 |
SID: | 2027339 |
Source Port: | 49732 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2323.73.117.7943474802030092 08/09/23-07:15:40.896038 |
SID: | 2030092 |
Source Port: | 43474 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23218.25.151.8652186802030092 08/09/23-07:16:38.940836 |
SID: | 2030092 |
Source Port: | 52186 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23108.156.89.24240818802030092 08/09/23-07:15:27.403938 |
SID: | 2030092 |
Source Port: | 40818 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23164.138.115.5050988802030092 08/09/23-07:15:19.680940 |
SID: | 2030092 |
Source Port: | 50988 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2371.43.87.7456714802030092 08/09/23-07:16:56.461875 |
SID: | 2030092 |
Source Port: | 56714 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.234.228.40.22151722802030092 08/09/23-07:16:34.021962 |
SID: | 2030092 |
Source Port: | 51722 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23181.12.65.949452802030092 08/09/23-07:15:55.003208 |
SID: | 2030092 |
Source Port: | 49452 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23191.61.128.17850732528692027339 08/09/23-07:16:01.033655 |
SID: | 2027339 |
Source Port: | 50732 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.238.217.48.13338516802030092 08/09/23-07:15:08.659649 |
SID: | 2030092 |
Source Port: | 38516 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23191.61.139.18650270528692027339 08/09/23-07:16:36.672935 |
SID: | 2027339 |
Source Port: | 50270 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23202.236.169.16253792802030092 08/09/23-07:16:34.819767 |
SID: | 2030092 |
Source Port: | 53792 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2343.240.75.17150170802030092 08/09/23-07:15:52.067428 |
SID: | 2030092 |
Source Port: | 50170 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2318.138.31.11149726802030092 08/09/23-07:16:33.818234 |
SID: | 2030092 |
Source Port: | 49726 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23190.0.166.5353204802030092 08/09/23-07:15:12.007947 |
SID: | 2030092 |
Source Port: | 53204 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23191.61.128.3850710528692027339 08/09/23-07:16:01.034875 |
SID: | 2027339 |
Source Port: | 50710 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23154.89.85.18938198802030092 08/09/23-07:16:14.120315 |
SID: | 2030092 |
Source Port: | 38198 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.85.129.1258716802030092 08/09/23-07:15:45.541075 |
SID: | 2030092 |
Source Port: | 58716 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23154.26.217.4553812802030092 08/09/23-07:16:41.357179 |
SID: | 2030092 |
Source Port: | 53812 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23149.96.247.3542276802030092 08/09/23-07:17:01.882206 |
SID: | 2030092 |
Source Port: | 42276 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2397.85.122.4735346802030092 08/09/23-07:16:28.863688 |
SID: | 2030092 |
Source Port: | 35346 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2354.65.163.22255406802030092 08/09/23-07:15:40.745889 |
SID: | 2030092 |
Source Port: | 55406 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23185.158.139.6034432802030092 08/09/23-07:15:31.566051 |
SID: | 2030092 |
Source Port: | 34432 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23116.171.16.4041020802030092 08/09/23-07:16:10.589115 |
SID: | 2030092 |
Source Port: | 41020 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2318.231.49.6445470802030092 08/09/23-07:16:44.127581 |
SID: | 2030092 |
Source Port: | 45470 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23222.228.100.4842258802030092 08/09/23-07:16:34.887975 |
SID: | 2030092 |
Source Port: | 42258 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23191.61.61.1953426528692027339 08/09/23-07:16:24.099267 |
SID: | 2027339 |
Source Port: | 53426 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23191.61.148.9433776528692027339 08/09/23-07:16:44.200380 |
SID: | 2027339 |
Source Port: | 33776 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23185.135.206.25045838802030092 08/09/23-07:16:04.891328 |
SID: | 2030092 |
Source Port: | 45838 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2359.7.22.20238002802030092 08/09/23-07:16:53.247449 |
SID: | 2030092 |
Source Port: | 38002 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2368.10.57.22059060802030092 08/09/23-07:15:58.793948 |
SID: | 2030092 |
Source Port: | 59060 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23191.61.232.18246958528692027339 08/09/23-07:15:37.024465 |
SID: | 2027339 |
Source Port: | 46958 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23104.92.147.24059426802030092 08/09/23-07:16:00.889926 |
SID: | 2030092 |
Source Port: | 59426 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23217.112.189.5250820802030092 08/09/23-07:16:15.158190 |
SID: | 2030092 |
Source Port: | 50820 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23125.229.216.351508802030092 08/09/23-07:15:07.813905 |
SID: | 2030092 |
Source Port: | 51508 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23185.44.210.5145426802030092 08/09/23-07:15:53.419810 |
SID: | 2030092 |
Source Port: | 45426 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23109.36.142.16344620802030092 08/09/23-07:15:46.684107 |
SID: | 2030092 |
Source Port: | 44620 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23191.61.207.18233514528692027339 08/09/23-07:16:48.452101 |
SID: | 2027339 |
Source Port: | 33514 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23151.147.235.7336064802030092 08/09/23-07:15:43.948032 |
SID: | 2030092 |
Source Port: | 36064 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2343.243.130.3057770802030092 08/09/23-07:15:53.687751 |
SID: | 2030092 |
Source Port: | 57770 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23101.62.194.15749312802030092 08/09/23-07:15:58.465230 |
SID: | 2030092 |
Source Port: | 49312 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2347.97.198.21359330802030092 08/09/23-07:15:36.083536 |
SID: | 2030092 |
Source Port: | 59330 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23125.227.240.7853014802030092 08/09/23-07:15:47.891685 |
SID: | 2030092 |
Source Port: | 53014 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23145.239.224.4053898802030092 08/09/23-07:17:00.337425 |
SID: | 2030092 |
Source Port: | 53898 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2354.146.249.10853244802030092 08/09/23-07:15:28.557322 |
SID: | 2030092 |
Source Port: | 53244 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23108.156.89.24241244802030092 08/09/23-07:15:34.046981 |
SID: | 2030092 |
Source Port: | 41244 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23106.52.132.16043540802030092 08/09/23-07:16:25.424310 |
SID: | 2030092 |
Source Port: | 43540 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23122.116.238.2654658802030092 08/09/23-07:15:48.845675 |
SID: | 2030092 |
Source Port: | 54658 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2378.73.68.6835724802030092 08/09/23-07:15:56.528737 |
SID: | 2030092 |
Source Port: | 35724 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23154.92.76.543222802030092 08/09/23-07:15:43.849749 |
SID: | 2030092 |
Source Port: | 43222 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2318.214.63.19150652802030092 08/09/23-07:15:18.540127 |
SID: | 2030092 |
Source Port: | 50652 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2381.169.213.14140556802030092 08/09/23-07:16:41.349983 |
SID: | 2030092 |
Source Port: | 40556 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23142.251.72.7459578802030092 08/09/23-07:15:45.801807 |
SID: | 2030092 |
Source Port: | 59578 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.99.216.18144416802030092 08/09/23-07:15:48.848385 |
SID: | 2030092 |
Source Port: | 44416 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23111.230.95.3335644802030092 08/09/23-07:15:57.040245 |
SID: | 2030092 |
Source Port: | 35644 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2369.24.22.3242186802030092 08/09/23-07:15:51.566461 |
SID: | 2030092 |
Source Port: | 42186 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2354.225.24.6742666802030092 08/09/23-07:16:51.735408 |
SID: | 2030092 |
Source Port: | 42666 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.76.77.11634188802030092 08/09/23-07:15:11.785223 |
SID: | 2030092 |
Source Port: | 34188 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.252.35.22142976802030092 08/09/23-07:15:48.634467 |
SID: | 2030092 |
Source Port: | 42976 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2389.47.98.22356064802030092 08/09/23-07:17:01.728728 |
SID: | 2030092 |
Source Port: | 56064 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.55.151.20141492802030092 08/09/23-07:15:37.570052 |
SID: | 2030092 |
Source Port: | 41492 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23142.11.241.5252722802030092 08/09/23-07:16:51.755379 |
SID: | 2030092 |
Source Port: | 52722 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23159.69.43.23560210802030092 08/09/23-07:15:31.340441 |
SID: | 2030092 |
Source Port: | 60210 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23139.196.146.18559742802030092 08/09/23-07:16:00.545955 |
SID: | 2030092 |
Source Port: | 59742 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23164.138.117.24057120802030092 08/09/23-07:16:50.030518 |
SID: | 2030092 |
Source Port: | 57120 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2351.210.83.19638344802030092 08/09/23-07:15:47.344543 |
SID: | 2030092 |
Source Port: | 38344 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2364.64.13.23148500802030092 08/09/23-07:16:50.927618 |
SID: | 2030092 |
Source Port: | 48500 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2370.32.72.2758092802030092 08/09/23-07:15:37.702719 |
SID: | 2030092 |
Source Port: | 58092 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23108.139.11.16460758802030092 08/09/23-07:16:22.718623 |
SID: | 2030092 |
Source Port: | 60758 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23191.101.118.8038852802030092 08/09/23-07:16:15.287854 |
SID: | 2030092 |
Source Port: | 38852 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23212.47.240.14641042802030092 08/09/23-07:15:51.480058 |
SID: | 2030092 |
Source Port: | 41042 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23111.206.127.13260682802030092 08/09/23-07:15:22.036719 |
SID: | 2030092 |
Source Port: | 60682 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23123.209.224.11356168802030092 08/09/23-07:15:57.120530 |
SID: | 2030092 |
Source Port: | 56168 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2351.38.59.4955326802030092 08/09/23-07:15:11.637634 |
SID: | 2030092 |
Source Port: | 55326 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2354.150.133.17939702802030092 08/09/23-07:15:40.745951 |
SID: | 2030092 |
Source Port: | 39702 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23220.76.164.11139398802030092 08/09/23-07:16:45.526343 |
SID: | 2030092 |
Source Port: | 39398 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.108.234.2535864802030092 08/09/23-07:15:04.440052 |
SID: | 2030092 |
Source Port: | 35864 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23195.191.24.7233818802030092 08/09/23-07:15:18.582773 |
SID: | 2030092 |
Source Port: | 33818 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23191.61.80.14657138528692027339 08/09/23-07:15:45.528930 |
SID: | 2027339 |
Source Port: | 57138 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23191.61.98.250738528692027339 08/09/23-07:15:45.528982 |
SID: | 2027339 |
Source Port: | 50738 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23170.231.56.2542660802030092 08/09/23-07:16:08.741774 |
SID: | 2030092 |
Source Port: | 42660 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2343.200.247.6138456802030092 08/09/23-07:15:10.184381 |
SID: | 2030092 |
Source Port: | 38456 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23190.133.101.841362528692027339 08/09/23-07:16:42.943867 |
SID: | 2027339 |
Source Port: | 41362 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23138.100.158.19659240802030092 08/09/23-07:16:14.368059 |
SID: | 2030092 |
Source Port: | 59240 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2334.43.183.18258742802030092 08/09/23-07:15:04.306868 |
SID: | 2030092 |
Source Port: | 58742 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23103.231.195.15356804802030092 08/09/23-07:15:48.864908 |
SID: | 2030092 |
Source Port: | 56804 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2385.158.176.6645282802030092 08/09/23-07:16:56.350485 |
SID: | 2030092 |
Source Port: | 45282 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2374.206.196.21741290802030092 08/09/23-07:16:26.599516 |
SID: | 2030092 |
Source Port: | 41290 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2318.136.3.6536412802030092 08/09/23-07:16:31.631503 |
SID: | 2030092 |
Source Port: | 36412 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2345.133.215.15950008802030092 08/09/23-07:15:11.755130 |
SID: | 2030092 |
Source Port: | 50008 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2318.160.56.16545284802030092 08/09/23-07:16:19.985802 |
SID: | 2030092 |
Source Port: | 45284 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23154.64.87.1452312802030092 08/09/23-07:15:04.617976 |
SID: | 2030092 |
Source Port: | 52312 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.198.109.12649328802030092 08/09/23-07:16:25.323103 |
SID: | 2030092 |
Source Port: | 49328 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23139.224.104.18749754802030092 08/09/23-07:16:15.901743 |
SID: | 2030092 |
Source Port: | 49754 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2365.108.124.17854716802030092 08/09/23-07:16:10.052083 |
SID: | 2030092 |
Source Port: | 54716 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23192.186.206.13448138802030092 08/09/23-07:15:53.557692 |
SID: | 2030092 |
Source Port: | 48138 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23191.61.241.11045690528692027339 08/09/23-07:15:32.772167 |
SID: | 2027339 |
Source Port: | 45690 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2318.208.183.7360584802030092 08/09/23-07:15:49.615427 |
SID: | 2030092 |
Source Port: | 60584 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23151.65.38.13435168802030092 08/09/23-07:15:31.173921 |
SID: | 2030092 |
Source Port: | 35168 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23114.32.32.11043548802030092 08/09/23-07:15:25.763612 |
SID: | 2030092 |
Source Port: | 43548 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.119.168.840002802030092 08/09/23-07:16:22.742405 |
SID: | 2030092 |
Source Port: | 40002 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23192.169.166.8151726802030092 08/09/23-07:15:56.815164 |
SID: | 2030092 |
Source Port: | 51726 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2354.163.115.23945750802030092 08/09/23-07:15:56.568154 |
SID: | 2030092 |
Source Port: | 45750 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.40.233.18833028802030092 08/09/23-07:16:48.482965 |
SID: | 2030092 |
Source Port: | 33028 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23138.100.0.4758820802030092 08/09/23-07:17:00.353089 |
SID: | 2030092 |
Source Port: | 58820 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23191.61.34.17233738528692027339 08/09/23-07:15:32.772198 |
SID: | 2027339 |
Source Port: | 33738 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23134.119.0.8037786802030092 08/09/23-07:16:19.885278 |
SID: | 2030092 |
Source Port: | 37786 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2334.36.250.22837738802030092 08/09/23-07:15:54.873665 |
SID: | 2030092 |
Source Port: | 37738 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.64.19.23849254802030092 08/09/23-07:16:18.952905 |
SID: | 2030092 |
Source Port: | 49254 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2338.47.228.11747510802030092 08/09/23-07:15:44.046462 |
SID: | 2030092 |
Source Port: | 47510 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.206.218.7438222802030092 08/09/23-07:16:20.080408 |
SID: | 2030092 |
Source Port: | 38222 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.34.212.5833556802030092 08/09/23-07:15:40.242440 |
SID: | 2030092 |
Source Port: | 33556 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23116.222.249.23145216802030092 08/09/23-07:15:43.912778 |
SID: | 2030092 |
Source Port: | 45216 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23117.245.53.15440132802030092 08/09/23-07:15:45.251109 |
SID: | 2030092 |
Source Port: | 40132 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23116.203.143.145176802030092 08/09/23-07:16:33.838745 |
SID: | 2030092 |
Source Port: | 45176 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23148.251.236.6142724802030092 08/09/23-07:16:48.395584 |
SID: | 2030092 |
Source Port: | 42724 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23178.45.180.10939274802030092 08/09/23-07:15:45.131252 |
SID: | 2030092 |
Source Port: | 39274 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.20.13.3659370802030092 08/09/23-07:15:21.916497 |
SID: | 2030092 |
Source Port: | 59370 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2369.187.29.2052066802030092 08/09/23-07:16:15.230531 |
SID: | 2030092 |
Source Port: | 52066 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2318.210.37.4246032802030092 08/09/23-07:16:08.587701 |
SID: | 2030092 |
Source Port: | 46032 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23191.61.39.13646996528692027339 08/09/23-07:16:24.092742 |
SID: | 2027339 |
Source Port: | 46996 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2338.47.228.11748290802030092 08/09/23-07:15:56.648326 |
SID: | 2030092 |
Source Port: | 48290 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.3.88.22452100802030092 08/09/23-07:16:15.273793 |
SID: | 2030092 |
Source Port: | 52100 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2368.168.113.23042938802030092 08/09/23-07:15:56.556749 |
SID: | 2030092 |
Source Port: | 42938 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2318.182.55.11947318802030092 08/09/23-07:15:27.777901 |
SID: | 2030092 |
Source Port: | 47318 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2389.47.178.14947418802030092 08/09/23-07:15:33.981693 |
SID: | 2030092 |
Source Port: | 47418 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23206.238.121.6259618802030092 08/09/23-07:16:32.962833 |
SID: | 2030092 |
Source Port: | 59618 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.192.53.21352706802030092 08/09/23-07:15:37.636005 |
SID: | 2030092 |
Source Port: | 52706 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.94.36.22643752802030092 08/09/23-07:15:30.420911 |
SID: | 2030092 |
Source Port: | 43752 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23191.61.246.14660418528692027339 08/09/23-07:15:57.090529 |
SID: | 2027339 |
Source Port: | 60418 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2323.54.90.4145486802030092 08/09/23-07:15:40.233642 |
SID: | 2030092 |
Source Port: | 45486 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23109.36.56.14341354802030092 08/09/23-07:16:02.659949 |
SID: | 2030092 |
Source Port: | 41354 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2324.39.171.18260568802030092 08/09/23-07:15:28.680508 |
SID: | 2030092 |
Source Port: | 60568 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2358.30.210.1733774802030092 08/09/23-07:15:19.073995 |
SID: | 2030092 |
Source Port: | 33774 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.221.46.6744966802030092 08/09/23-07:16:53.037421 |
SID: | 2030092 |
Source Port: | 44966 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.216.158.11049502802030092 08/09/23-07:16:59.128565 |
SID: | 2030092 |
Source Port: | 49502 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2354.193.209.11638572802030092 08/09/23-07:15:47.099203 |
SID: | 2030092 |
Source Port: | 38572 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23154.89.85.18937642802030092 08/09/23-07:16:06.083237 |
SID: | 2030092 |
Source Port: | 37642 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23192.190.180.3149004802030092 08/09/23-07:16:38.844724 |
SID: | 2030092 |
Source Port: | 49004 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.54.190.18460456802030092 08/09/23-07:15:56.659593 |
SID: | 2030092 |
Source Port: | 60456 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23190.18.209.14132912802030092 08/09/23-07:15:35.539766 |
SID: | 2030092 |
Source Port: | 32912 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23116.92.244.14639848802030092 08/09/23-07:16:36.825544 |
SID: | 2030092 |
Source Port: | 39848 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2344.209.12.20759292802030092 08/09/23-07:16:44.026490 |
SID: | 2030092 |
Source Port: | 59292 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2391.107.202.21460224802030092 08/09/23-07:15:45.306223 |
SID: | 2030092 |
Source Port: | 60224 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2347.225.192.22652704802030092 08/09/23-07:15:55.048597 |
SID: | 2030092 |
Source Port: | 52704 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23211.1.229.25254334802030092 08/09/23-07:15:19.073351 |
SID: | 2030092 |
Source Port: | 54334 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.19.239.9749014802030092 08/09/23-07:15:15.474968 |
SID: | 2030092 |
Source Port: | 49014 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2359.89.161.25560726802030092 08/09/23-07:15:27.645194 |
SID: | 2030092 |
Source Port: | 60726 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2368.183.201.23356738802030092 08/09/23-07:16:16.906010 |
SID: | 2030092 |
Source Port: | 56738 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2334.150.249.15453068802030092 08/09/23-07:16:10.513673 |
SID: | 2030092 |
Source Port: | 53068 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.61.184.14938374802030092 08/09/23-07:17:01.808850 |
SID: | 2030092 |
Source Port: | 38374 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23124.251.119.7433306802030092 08/09/23-07:16:51.211410 |
SID: | 2030092 |
Source Port: | 33306 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2358.229.121.18154354802030092 08/09/23-07:16:38.786893 |
SID: | 2030092 |
Source Port: | 54354 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.164.237.5457528802030092 08/09/23-07:15:18.798557 |
SID: | 2030092 |
Source Port: | 57528 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.222.208.20544306802030092 08/09/23-07:15:27.619442 |
SID: | 2030092 |
Source Port: | 44306 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.7.34.12856282802030092 08/09/23-07:16:19.985760 |
SID: | 2030092 |
Source Port: | 56282 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23129.146.141.17644446802030092 08/09/23-07:15:48.799236 |
SID: | 2030092 |
Source Port: | 44446 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23203.113.52.12434370802030092 08/09/23-07:16:32.449648 |
SID: | 2030092 |
Source Port: | 34370 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23201.110.120.141952802030092 08/09/23-07:16:44.707215 |
SID: | 2030092 |
Source Port: | 41952 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23159.253.188.24258750802030092 08/09/23-07:16:36.136572 |
SID: | 2030092 |
Source Port: | 58750 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23143.204.17.3844076802030092 08/09/23-07:15:27.864328 |
SID: | 2030092 |
Source Port: | 44076 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23184.31.119.18832906802030092 08/09/23-07:15:15.708920 |
SID: | 2030092 |
Source Port: | 32906 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2393.90.205.7559528802030092 08/09/23-07:16:51.639229 |
SID: | 2030092 |
Source Port: | 59528 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2340.83.191.7458700802030092 08/09/23-07:16:08.648653 |
SID: | 2030092 |
Source Port: | 58700 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.226.19.3534816802030092 08/09/23-07:16:10.513714 |
SID: | 2030092 |
Source Port: | 34816 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2387.118.94.24354482802030092 08/09/23-07:15:36.789987 |
SID: | 2030092 |
Source Port: | 54482 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23185.138.106.2453526802030092 08/09/23-07:15:35.709115 |
SID: | 2030092 |
Source Port: | 53526 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2335.74.157.12243124802030092 08/09/23-07:15:14.910710 |
SID: | 2030092 |
Source Port: | 43124 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23180.210.207.11652448802030092 08/09/23-07:16:15.772015 |
SID: | 2030092 |
Source Port: | 52448 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23185.14.246.10443730802030092 08/09/23-07:15:40.326945 |
SID: | 2030092 |
Source Port: | 43730 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.232.21.134.8942280802030092 08/09/23-07:16:48.482238 |
SID: | 2030092 |
Source Port: | 42280 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2334.206.130.22445480802030092 08/09/23-07:15:35.776113 |
SID: | 2030092 |
Source Port: | 45480 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.216.69.4154058802030092 08/09/23-07:16:52.986109 |
SID: | 2030092 |
Source Port: | 54058 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2318.161.90.2544228802030092 08/09/23-07:15:27.313541 |
SID: | 2030092 |
Source Port: | 44228 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.57.16.20751320802030092 08/09/23-07:16:06.811107 |
SID: | 2030092 |
Source Port: | 51320 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.105.209.11343750802030092 08/09/23-07:15:28.728285 |
SID: | 2030092 |
Source Port: | 43750 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23118.214.108.4648008802030092 08/09/23-07:16:10.186551 |
SID: | 2030092 |
Source Port: | 48008 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2372.246.155.4337928802030092 08/09/23-07:16:47.659848 |
SID: | 2030092 |
Source Port: | 37928 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2351.68.83.19740766802030092 08/09/23-07:15:56.472460 |
SID: | 2030092 |
Source Port: | 40766 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2378.47.45.341272802030092 08/09/23-07:16:19.888452 |
SID: | 2030092 |
Source Port: | 41272 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23197.243.21.8457798802030092 08/09/23-07:16:56.744872 |
SID: | 2030092 |
Source Port: | 57798 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23154.213.152.20045494802030092 08/09/23-07:15:12.922051 |
SID: | 2030092 |
Source Port: | 45494 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23191.61.219.8451268528692027339 08/09/23-07:16:10.318112 |
SID: | 2027339 |
Source Port: | 51268 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23164.88.46.14036864802030092 08/09/23-07:17:00.521073 |
SID: | 2030092 |
Source Port: | 36864 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23118.189.31.9043608802030092 08/09/23-07:15:37.538219 |
SID: | 2030092 |
Source Port: | 43608 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2366.228.60.14656170802030092 08/09/23-07:15:18.540026 |
SID: | 2030092 |
Source Port: | 56170 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23160.124.221.10934690802030092 08/09/23-07:15:12.677575 |
SID: | 2030092 |
Source Port: | 34690 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2318.155.126.4255460802030092 08/09/23-07:15:33.949941 |
SID: | 2030092 |
Source Port: | 55460 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.148.49.18737216802030092 08/09/23-07:16:00.607442 |
SID: | 2030092 |
Source Port: | 37216 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23191.61.33.25336294528692027339 08/09/23-07:15:19.459863 |
SID: | 2027339 |
Source Port: | 36294 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23104.20.138.7655686802030092 08/09/23-07:16:44.253586 |
SID: | 2030092 |
Source Port: | 55686 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23108.156.89.24241008802030092 08/09/23-07:15:31.251318 |
SID: | 2030092 |
Source Port: | 41008 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23184.24.246.10539292802030092 08/09/23-07:16:56.618852 |
SID: | 2030092 |
Source Port: | 39292 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23148.72.244.17439544802030092 08/09/23-07:15:34.506007 |
SID: | 2030092 |
Source Port: | 39544 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2318.161.12.6046436802030092 08/09/23-07:16:38.629088 |
SID: | 2030092 |
Source Port: | 46436 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23191.61.222.8947520528692027339 08/09/23-07:15:57.090512 |
SID: | 2027339 |
Source Port: | 47520 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2388.198.65.16452874802030092 08/09/23-07:16:56.342027 |
SID: | 2030092 |
Source Port: | 52874 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23147.139.92.20457220802030092 08/09/23-07:16:57.597877 |
SID: | 2030092 |
Source Port: | 57220 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2382.185.178.14940160802030092 08/09/23-07:16:49.928796 |
SID: | 2030092 |
Source Port: | 40160 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23128.245.150.10958366802030092 08/09/23-07:15:11.712386 |
SID: | 2030092 |
Source Port: | 58366 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23191.61.226.9038538528692027339 08/09/23-07:16:01.033491 |
SID: | 2027339 |
Source Port: | 38538 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2323.54.113.550924802030092 08/09/23-07:15:45.280662 |
SID: | 2030092 |
Source Port: | 50924 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2345.60.38.20447236802030092 08/09/23-07:15:51.705409 |
SID: | 2030092 |
Source Port: | 47236 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23213.139.243.340588802030092 08/09/23-07:15:37.568828 |
SID: | 2030092 |
Source Port: | 40588 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23211.225.81.21954132802030092 08/09/23-07:16:51.877752 |
SID: | 2030092 |
Source Port: | 54132 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | ReversingLabs: |
Source: | Joe Sandbox ML: |
Networking |
---|
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | Socket: | Jump to behavior |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |