Linux
Analysis Report
yourbiggestnightmare.arm.elf
Overview
General Information
Detection
Mirai
Score: | 96 |
Range: | 0 - 100 |
Whitelisted: | false |
Signatures
Antivirus / Scanner detection for submitted sample
Yara detected Mirai
Multi AV Scanner detection for submitted file
Detected Mirai
Snort IDS alert for network traffic
Connects to many ports of the same IP (likely port scanning)
Reads system files that contain records of logged in users
Uses known network protocols on non-standard ports
Sample reads /proc/mounts (often used for finding a writable filesystem)
Reads CPU information from /sys indicative of miner or evasive malware
Executes the "grep" command used to find patterns in files or piped streams
Uses the "uname" system call to query kernel version information (possible evasion)
Enumerates processes within the "proc" file system
Detected TCP or UDP traffic on non-standard ports
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Creates hidden files and/or directories
Sample has stripped symbol table
Sample tries to set the executable flag
HTTP GET or POST without a user agent
Executes commands using a shell command-line interpreter
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Classification
Analysis Advice
Some HTTP requests failed (404). It is likely that the sample will exhibit less behavior. |
Static ELF header machine description suggests that the sample might not execute correctly on this machine. |
Static ELF header machine description suggests that the sample might only run correctly on MIPS or ARM architectures. |
Joe Sandbox Version: | 38.0.0 Beryl |
Analysis ID: | 1297880 |
Start date and time: | 2023-08-26 18:51:10 +02:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 6m 32s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11) |
Analysis Mode: | default |
Sample file name: | yourbiggestnightmare.arm.elf |
Detection: | MAL |
Classification: | mal96.troj.linELF@0/3@3/0 |
- Report size exceeded maximum capacity and may have missing network information.
- VT rate limit hit for: hiro.nulling.to
Command: | /tmp/yourbiggestnightmare.arm.elf |
PID: | 5529 |
Exit Code: | 0 |
Exit Code Info: | |
Killed: | False |
Standard Output: | nightmarehere |
Standard Error: |
- system is lnxubuntu20
- yourbiggestnightmare.arm.elf New Fork (PID: 5531, Parent: 5529)
- yourbiggestnightmare.arm.elf New Fork (PID: 5532, Parent: 5529)
- yourbiggestnightmare.arm.elf New Fork (PID: 5535, Parent: 5532)
- yourbiggestnightmare.arm.elf New Fork (PID: 5536, Parent: 5532)
- yourbiggestnightmare.arm.elf New Fork (PID: 5539, Parent: 5532)
- yourbiggestnightmare.arm.elf New Fork (PID: 5540, Parent: 5532)
- yourbiggestnightmare.arm.elf New Fork (PID: 5541, Parent: 5532)
- yourbiggestnightmare.arm.elf New Fork (PID: 5546, Parent: 5532)
- yourbiggestnightmare.arm.elf New Fork (PID: 5547, Parent: 5532)
- yourbiggestnightmare.arm.elf New Fork (PID: 5549, Parent: 5532)
- yourbiggestnightmare.arm.elf New Fork (PID: 5551, Parent: 5532)
- yourbiggestnightmare.arm.elf New Fork (PID: 5552, Parent: 5532)
- yourbiggestnightmare.arm.elf New Fork (PID: 5555, Parent: 5532)
- yourbiggestnightmare.arm.elf New Fork (PID: 5557, Parent: 5532)
- yourbiggestnightmare.arm.elf New Fork (PID: 5559, Parent: 5532)
- gnome-session-binary New Fork (PID: 5615, Parent: 1498)
- gnome-shell New Fork (PID: 5807, Parent: 5615)
- ibus-daemon New Fork (PID: 5812, Parent: 5807)
- ibus-daemon New Fork (PID: 5814, Parent: 5807)
- ibus-daemon New Fork (PID: 5815, Parent: 5814)
- ibus-daemon New Fork (PID: 5979, Parent: 5807)
- systemd New Fork (PID: 5658, Parent: 1)
- dbus-daemon New Fork (PID: 5817, Parent: 5816)
- Xorg New Fork (PID: 5827, Parent: 1486)
- sh New Fork (PID: 5828, Parent: 5827)
- systemd New Fork (PID: 5830, Parent: 1)
- accounts-daemon New Fork (PID: 5845, Parent: 5830)
- language-validate New Fork (PID: 5846, Parent: 5845)
- language-options New Fork (PID: 5847, Parent: 5846)
- systemd New Fork (PID: 5850, Parent: 1)
- dbus-daemon New Fork (PID: 5959, Parent: 5958)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Mirai | Mirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world. | No Attribution |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Mirai_8 | Yara detected Mirai | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Mirai_8 | Yara detected Mirai | Joe Security | ||
JoeSecurity_Mirai_8 | Yara detected Mirai | Joe Security | ||
JoeSecurity_Mirai_8 | Yara detected Mirai | Joe Security | ||
JoeSecurity_Mirai_8 | Yara detected Mirai | Joe Security | ||
JoeSecurity_Mirai_8 | Yara detected Mirai | Joe Security |
Timestamp: | 192.168.2.1534.43.210.205998075472023548 08/26/23-18:52:05.059663 |
SID: | 2023548 |
Source Port: | 59980 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15186.139.120.54685075472023548 08/26/23-18:52:01.499744 |
SID: | 2023548 |
Source Port: | 46850 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15121.149.114.1354401075472023548 08/26/23-18:52:22.449290 |
SID: | 2023548 |
Source Port: | 44010 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1571.1.237.623658075472023548 08/26/23-18:52:05.035351 |
SID: | 2023548 |
Source Port: | 36580 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15159.203.72.14734370802835221 08/26/23-18:52:12.624145 |
SID: | 2835221 |
Source Port: | 34370 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1568.169.168.1184382875472023548 08/26/23-18:52:16.568952 |
SID: | 2023548 |
Source Port: | 43828 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1550.35.93.313582675472023548 08/26/23-18:52:20.397033 |
SID: | 2023548 |
Source Port: | 35826 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1532.223.118.893850875472023548 08/26/23-18:52:21.048192 |
SID: | 2023548 |
Source Port: | 38508 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15194.193.182.965236075472023548 08/26/23-18:52:17.140667 |
SID: | 2023548 |
Source Port: | 52360 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1595.10.155.6658828802027121 08/26/23-18:52:19.920705 |
SID: | 2027121 |
Source Port: | 58828 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1513.209.191.5148926802030092 08/26/23-18:52:02.277038 |
SID: | 2030092 |
Source Port: | 48926 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1581.150.155.444567675472023548 08/26/23-18:52:18.100823 |
SID: | 2023548 |
Source Port: | 45676 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15172.67.155.6146388802030092 08/26/23-18:52:06.215157 |
SID: | 2030092 |
Source Port: | 46388 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15152.254.192.1395684075472023548 08/26/23-18:52:22.423946 |
SID: | 2023548 |
Source Port: | 56840 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15184.190.117.1343950075472023548 08/26/23-18:52:21.314795 |
SID: | 2023548 |
Source Port: | 39500 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15192.143.80.44209875472023548 08/26/23-18:52:17.386777 |
SID: | 2023548 |
Source Port: | 42098 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1595.217.188.11944646802027121 08/26/23-18:52:09.700311 |
SID: | 2027121 |
Source Port: | 44646 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15178.90.186.4839910802030092 08/26/23-18:52:19.047371 |
SID: | 2030092 |
Source Port: | 39910 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15212.93.110.1656908802835221 08/26/23-18:52:21.732363 |
SID: | 2835221 |
Source Port: | 56908 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15200.162.206.2154059675472023548 08/26/23-18:52:05.398742 |
SID: | 2023548 |
Source Port: | 40596 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15112.179.77.525719075472023548 08/26/23-18:52:17.000188 |
SID: | 2023548 |
Source Port: | 57190 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1524.181.92.615678675472023548 08/26/23-18:52:05.337276 |
SID: | 2023548 |
Source Port: | 56786 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1550.111.214.1525170675472023548 08/26/23-18:52:06.789743 |
SID: | 2023548 |
Source Port: | 51706 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15201.231.83.113836075472023548 08/26/23-18:52:22.719678 |
SID: | 2023548 |
Source Port: | 38360 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1552.66.143.20039590802030092 08/26/23-18:52:22.253415 |
SID: | 2030092 |
Source Port: | 39590 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.158.8.8.858742532027757 08/26/23-18:51:57.586552 |
SID: | 2027757 |
Source Port: | 58742 |
Destination Port: | 53 |
Protocol: | UDP |
Classtype: | Potentially Bad Traffic |
Timestamp: | 192.168.2.1572.195.216.1063436275472023548 08/26/23-18:52:05.399051 |
SID: | 2023548 |
Source Port: | 34362 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15207.155.63.1024086075472023548 08/26/23-18:52:01.097961 |
SID: | 2023548 |
Source Port: | 40860 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1588.218.117.12460976802027121 08/26/23-18:52:07.523051 |
SID: | 2027121 |
Source Port: | 60976 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1595.98.43.10651240802027121 08/26/23-18:52:19.872151 |
SID: | 2027121 |
Source Port: | 51240 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15175.240.1.704697875472023548 08/26/23-18:52:02.848388 |
SID: | 2023548 |
Source Port: | 46978 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1541.224.218.1264992075472023548 08/26/23-18:52:12.100250 |
SID: | 2023548 |
Source Port: | 49920 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1562.202.153.10239848555552841013 08/26/23-18:52:04.251378 |
SID: | 2841013 |
Source Port: | 39848 |
Destination Port: | 55555 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15118.48.154.1675476475472023548 08/26/23-18:52:16.994083 |
SID: | 2023548 |
Source Port: | 54764 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15212.252.126.3753462802835221 08/26/23-18:52:15.905676 |
SID: | 2835221 |
Source Port: | 53462 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1514.64.123.2064118075472023548 08/26/23-18:52:01.211971 |
SID: | 2023548 |
Source Port: | 41180 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1547.156.110.893588275472023548 08/26/23-18:52:02.017642 |
SID: | 2023548 |
Source Port: | 35882 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15146.247.158.834236475472023548 08/26/23-18:52:00.971836 |
SID: | 2023548 |
Source Port: | 42364 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1541.224.218.1264990075472023548 08/26/23-18:52:12.019978 |
SID: | 2023548 |
Source Port: | 49900 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15189.46.14.614963075472023548 08/26/23-18:52:16.920361 |
SID: | 2023548 |
Source Port: | 49630 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1570.113.170.1725074675472023548 08/26/23-18:52:16.593645 |
SID: | 2023548 |
Source Port: | 50746 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15181.168.253.1815880075472023548 08/26/23-18:52:22.186284 |
SID: | 2023548 |
Source Port: | 58800 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15181.169.130.1174431075472023548 08/26/23-18:52:01.660305 |
SID: | 2023548 |
Source Port: | 44310 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1595.68.76.1250230802027121 08/26/23-18:52:19.937302 |
SID: | 2027121 |
Source Port: | 50230 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1560.242.26.2044040475472023548 08/26/23-18:52:21.029565 |
SID: | 2023548 |
Source Port: | 40404 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15212.159.124.16235074802835221 08/26/23-18:52:04.216879 |
SID: | 2835221 |
Source Port: | 35074 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15112.182.150.914381475472023548 08/26/23-18:52:07.664882 |
SID: | 2023548 |
Source Port: | 43814 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15176.136.215.5049550802030092 08/26/23-18:52:12.691540 |
SID: | 2030092 |
Source Port: | 49550 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1534.120.14.1840814802030092 08/26/23-18:52:15.863431 |
SID: | 2030092 |
Source Port: | 40814 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1550.107.161.2064888075472023548 08/26/23-18:52:22.298373 |
SID: | 2023548 |
Source Port: | 48880 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15217.182.209.19650404802030092 08/26/23-18:52:15.035288 |
SID: | 2030092 |
Source Port: | 50404 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15185.39.212.18555200802030092 08/26/23-18:52:18.882738 |
SID: | 2030092 |
Source Port: | 55200 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15118.60.69.364447275472023548 08/26/23-18:52:12.118021 |
SID: | 2023548 |
Source Port: | 44472 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15194.193.182.965243075472023548 08/26/23-18:52:17.492403 |
SID: | 2023548 |
Source Port: | 52430 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15175.240.1.704695875472023548 08/26/23-18:52:02.567172 |
SID: | 2023548 |
Source Port: | 46958 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15146.247.158.834239475472023548 08/26/23-18:52:01.017194 |
SID: | 2023548 |
Source Port: | 42394 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15144.126.168.175849275472023548 08/26/23-18:52:02.366463 |
SID: | 2023548 |
Source Port: | 58492 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1514.58.214.393559475472023548 08/26/23-18:52:22.762041 |
SID: | 2023548 |
Source Port: | 35594 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15186.210.202.833890075472023548 08/26/23-18:52:12.357943 |
SID: | 2023548 |
Source Port: | 38900 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1531.52.183.134934675472023548 08/26/23-18:52:11.949776 |
SID: | 2023548 |
Source Port: | 49346 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1588.221.171.23843238802027121 08/26/23-18:52:14.251413 |
SID: | 2027121 |
Source Port: | 43238 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1584.215.42.1825428475472023548 08/26/23-18:52:16.484345 |
SID: | 2023548 |
Source Port: | 54284 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15112.184.187.1575915275472023548 08/26/23-18:52:20.799316 |
SID: | 2023548 |
Source Port: | 59152 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15119.216.119.644825675472023548 08/26/23-18:52:07.363331 |
SID: | 2023548 |
Source Port: | 48256 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1514.84.61.135603875472023548 08/26/23-18:52:05.461012 |
SID: | 2023548 |
Source Port: | 56038 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.152.69.62.195303675472023548 08/26/23-18:52:00.989105 |
SID: | 2023548 |
Source Port: | 53036 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1597.120.147.1195886675472023548 08/26/23-18:52:02.006208 |
SID: | 2023548 |
Source Port: | 58866 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1534.107.178.774558275472023548 08/26/23-18:52:11.903239 |
SID: | 2023548 |
Source Port: | 45582 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15208.101.95.2154383075472023548 08/26/23-18:51:59.754813 |
SID: | 2023548 |
Source Port: | 43830 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1561.75.75.313918475472023548 08/26/23-18:52:02.857970 |
SID: | 2023548 |
Source Port: | 39184 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1531.52.183.134935675472023548 08/26/23-18:52:12.011753 |
SID: | 2023548 |
Source Port: | 49356 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15115.3.25.2066041875472023548 08/26/23-18:52:06.493464 |
SID: | 2023548 |
Source Port: | 60418 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1554.154.28.19960966802030092 08/26/23-18:52:15.056830 |
SID: | 2030092 |
Source Port: | 60966 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15175.240.225.644846875472023548 08/26/23-18:52:18.383579 |
SID: | 2023548 |
Source Port: | 48468 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15104.105.34.7443004802030092 08/26/23-18:51:59.751988 |
SID: | 2030092 |
Source Port: | 43004 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15212.83.139.20738586802835221 08/26/23-18:52:21.663887 |
SID: | 2835221 |
Source Port: | 38586 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15112.184.187.1575912075472023548 08/26/23-18:52:20.514674 |
SID: | 2023548 |
Source Port: | 59120 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1599.229.154.2214181475472023548 08/26/23-18:52:02.094097 |
SID: | 2023548 |
Source Port: | 41814 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15105.103.11.2095002075472023548 08/26/23-18:52:07.030189 |
SID: | 2023548 |
Source Port: | 50020 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1541.109.27.674405875472023548 08/26/23-18:52:02.080564 |
SID: | 2023548 |
Source Port: | 44058 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1577.56.217.1104207075472023548 08/26/23-18:52:02.031786 |
SID: | 2023548 |
Source Port: | 42070 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15115.17.20.1156011475472023548 08/26/23-18:52:02.401664 |
SID: | 2023548 |
Source Port: | 60114 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15136.226.237.8537584555552841013 08/26/23-18:52:07.533301 |
SID: | 2841013 |
Source Port: | 37584 |
Destination Port: | 55555 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15183.105.31.624012075472023548 08/26/23-18:52:05.177222 |
SID: | 2023548 |
Source Port: | 40120 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15167.172.84.23158916802030092 08/26/23-18:52:08.174514 |
SID: | 2030092 |
Source Port: | 58916 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15188.121.123.8844416802030092 08/26/23-18:52:15.125562 |
SID: | 2030092 |
Source Port: | 44416 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1570.45.67.604253875472023548 08/26/23-18:52:01.312321 |
SID: | 2023548 |
Source Port: | 42538 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1595.88.71.14245494802027121 08/26/23-18:52:06.219968 |
SID: | 2027121 |
Source Port: | 45494 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15212.211.225.12346684802835221 08/26/23-18:52:07.414089 |
SID: | 2835221 |
Source Port: | 46684 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15104.85.0.7458292802030092 08/26/23-18:52:02.063295 |
SID: | 2030092 |
Source Port: | 58292 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1586.170.194.2544042675472023548 08/26/23-18:52:18.100035 |
SID: | 2023548 |
Source Port: | 40426 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1565.191.214.1254145875472023548 08/26/23-18:52:01.062541 |
SID: | 2023548 |
Source Port: | 41458 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15175.240.225.644851475472023548 08/26/23-18:52:18.669134 |
SID: | 2023548 |
Source Port: | 48514 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15175.210.2.674404475472023548 08/26/23-18:52:18.666054 |
SID: | 2023548 |
Source Port: | 44044 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1574.199.112.845452475472023548 08/26/23-18:52:01.957260 |
SID: | 2023548 |
Source Port: | 54524 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.152.69.151.514790675472023548 08/26/23-18:52:07.071092 |
SID: | 2023548 |
Source Port: | 47906 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1534.111.193.433972875472023548 08/26/23-18:52:06.532448 |
SID: | 2023548 |
Source Port: | 39728 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1569.202.190.293924675472023548 08/26/23-18:52:21.276783 |
SID: | 2023548 |
Source Port: | 39246 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15121.188.30.1484793475472023548 08/26/23-18:52:01.663628 |
SID: | 2023548 |
Source Port: | 47934 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15180.229.225.20044640802030092 08/26/23-18:52:07.330158 |
SID: | 2030092 |
Source Port: | 44640 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15115.3.25.2066028675472023548 08/26/23-18:52:05.181459 |
SID: | 2023548 |
Source Port: | 60286 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1568.169.168.1184385675472023548 08/26/23-18:52:16.705942 |
SID: | 2023548 |
Source Port: | 43856 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15191.55.17.1404345475472023548 08/26/23-18:52:18.212041 |
SID: | 2023548 |
Source Port: | 43454 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15104.140.90.18857620802835221 08/26/23-18:52:03.151542 |
SID: | 2835221 |
Source Port: | 57620 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1523.43.41.9660654802030092 08/26/23-18:52:00.656333 |
SID: | 2030092 |
Source Port: | 60654 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1524.29.56.505295075472023548 08/26/23-18:52:11.966276 |
SID: | 2023548 |
Source Port: | 52950 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15174.30.72.1183728875472023548 08/26/23-18:52:01.146988 |
SID: | 2023548 |
Source Port: | 37288 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15142.129.216.1514585075472023548 08/26/23-18:52:12.198867 |
SID: | 2023548 |
Source Port: | 45850 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15121.163.148.1854192475472023548 08/26/23-18:52:16.996768 |
SID: | 2023548 |
Source Port: | 41924 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1570.113.170.1725077875472023548 08/26/23-18:52:16.771712 |
SID: | 2023548 |
Source Port: | 50778 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1568.112.163.11548792802030092 08/26/23-18:52:22.283509 |
SID: | 2030092 |
Source Port: | 48792 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1588.148.92.13644630802027121 08/26/23-18:52:14.234557 |
SID: | 2027121 |
Source Port: | 44630 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15183.105.31.624025075472023548 08/26/23-18:52:05.458506 |
SID: | 2023548 |
Source Port: | 40250 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1571.7.99.2036044875472023548 08/26/23-18:52:16.828186 |
SID: | 2023548 |
Source Port: | 60448 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15189.122.34.1403375875472023548 08/26/23-18:52:20.698968 |
SID: | 2023548 |
Source Port: | 33758 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15175.210.2.674400675472023548 08/26/23-18:52:18.381721 |
SID: | 2023548 |
Source Port: | 44006 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1547.152.242.1495672075472023548 08/26/23-18:52:22.353248 |
SID: | 2023548 |
Source Port: | 56720 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1584.21.18.6159874802030092 08/26/23-18:52:02.034239 |
SID: | 2030092 |
Source Port: | 59874 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1552.30.105.16657042802030092 08/26/23-18:52:03.975029 |
SID: | 2030092 |
Source Port: | 57042 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15212.211.208.9443748802835221 08/26/23-18:51:59.510406 |
SID: | 2835221 |
Source Port: | 43748 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1595.101.96.20744540802027121 08/26/23-18:52:16.411968 |
SID: | 2027121 |
Source Port: | 44540 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15183.106.113.844503675472023548 08/26/23-18:52:17.364833 |
SID: | 2023548 |
Source Port: | 45036 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15152.170.97.1384285275472023548 08/26/23-18:52:16.952278 |
SID: | 2023548 |
Source Port: | 42852 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1534.211.191.12858566802030092 08/26/23-18:52:15.009439 |
SID: | 2030092 |
Source Port: | 58566 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1595.56.154.22846822802027121 08/26/23-18:52:09.859327 |
SID: | 2027121 |
Source Port: | 46822 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1569.202.206.495566075472023548 08/26/23-18:52:20.352558 |
SID: | 2023548 |
Source Port: | 55660 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15172.67.205.10359400802030092 08/26/23-18:52:02.952412 |
SID: | 2030092 |
Source Port: | 59400 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1594.196.24.1003616875472023548 08/26/23-18:52:19.204462 |
SID: | 2023548 |
Source Port: | 36168 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1547.156.110.893603875472023548 08/26/23-18:52:02.205870 |
SID: | 2023548 |
Source Port: | 36038 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1550.35.93.313584475472023548 08/26/23-18:52:20.561785 |
SID: | 2023548 |
Source Port: | 35844 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15121.137.118.975380875472023548 08/26/23-18:52:18.382071 |
SID: | 2023548 |
Source Port: | 53808 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1541.99.89.2124415475472023548 08/26/23-18:52:18.190075 |
SID: | 2023548 |
Source Port: | 44154 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15200.37.104.755907075472023548 08/26/23-18:52:01.205399 |
SID: | 2023548 |
Source Port: | 59070 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15186.139.120.54671075472023548 08/26/23-18:52:01.217068 |
SID: | 2023548 |
Source Port: | 46710 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1565.184.51.16158116802030092 08/26/23-18:52:17.098603 |
SID: | 2030092 |
Source Port: | 58116 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15199.232.66.4343618802030092 08/26/23-18:52:18.870781 |
SID: | 2030092 |
Source Port: | 43618 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1595.56.143.15358674802027121 08/26/23-18:52:21.085197 |
SID: | 2027121 |
Source Port: | 58674 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1599.226.45.993555475472023548 08/26/23-18:52:17.181524 |
SID: | 2023548 |
Source Port: | 35554 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15200.127.70.2285287075472023548 08/26/23-18:52:21.679468 |
SID: | 2023548 |
Source Port: | 52870 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1531.132.6.11247318802030092 08/26/23-18:51:59.617279 |
SID: | 2030092 |
Source Port: | 47318 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15149.109.111.2335948475472023548 08/26/23-18:52:16.627843 |
SID: | 2023548 |
Source Port: | 59484 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15112.199.66.7954560802027121 08/26/23-18:52:01.005689 |
SID: | 2027121 |
Source Port: | 54560 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1565.191.214.1254149675472023548 08/26/23-18:52:01.197514 |
SID: | 2023548 |
Source Port: | 41496 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1588.255.245.6352588802030092 08/26/23-18:52:17.140642 |
SID: | 2030092 |
Source Port: | 52588 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15164.138.117.12952060528692027339 08/26/23-18:52:08.770186 |
SID: | 2027339 |
Source Port: | 52060 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1559.6.103.2105884875472023548 08/26/23-18:52:17.370030 |
SID: | 2023548 |
Source Port: | 58848 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1595.86.99.6940236802027121 08/26/23-18:51:59.702181 |
SID: | 2027121 |
Source Port: | 40236 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1575.188.19.1393344875472023548 08/26/23-18:52:05.159711 |
SID: | 2023548 |
Source Port: | 33448 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15218.151.73.2214982275472023548 08/26/23-18:52:22.465474 |
SID: | 2023548 |
Source Port: | 49822 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15105.103.11.2095006875472023548 08/26/23-18:52:07.123732 |
SID: | 2023548 |
Source Port: | 50068 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15183.106.113.844515675472023548 08/26/23-18:52:18.652807 |
SID: | 2023548 |
Source Port: | 45156 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15216.129.185.7543014802030092 08/26/23-18:52:07.095666 |
SID: | 2030092 |
Source Port: | 43014 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15197.10.162.1724333075472023548 08/26/23-18:52:12.046339 |
SID: | 2023548 |
Source Port: | 43330 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1575.188.19.1393348875472023548 08/26/23-18:52:05.301432 |
SID: | 2023548 |
Source Port: | 33488 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1575.119.203.22548554802835221 08/26/23-18:52:00.763603 |
SID: | 2835221 |
Source Port: | 48554 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1544.208.37.3047226802030092 08/26/23-18:52:07.067409 |
SID: | 2030092 |
Source Port: | 47226 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15212.31.114.22739636802835221 08/26/23-18:52:18.274289 |
SID: | 2835221 |
Source Port: | 39636 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15197.39.106.7955382372152835222 08/26/23-18:52:00.602539 |
SID: | 2835222 |
Source Port: | 55382 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15154.7.26.16353454802030092 08/26/23-18:52:03.196742 |
SID: | 2030092 |
Source Port: | 53454 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1524.29.56.505290875472023548 08/26/23-18:52:10.820016 |
SID: | 2023548 |
Source Port: | 52908 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15184.190.117.1343945475472023548 08/26/23-18:52:21.173034 |
SID: | 2023548 |
Source Port: | 39454 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1550.106.143.1615500075472023548 08/26/23-18:52:18.188642 |
SID: | 2023548 |
Source Port: | 55000 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15109.36.92.2313967275472023548 08/26/23-18:51:59.680550 |
SID: | 2023548 |
Source Port: | 39672 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1588.216.52.1540954802027121 08/26/23-18:52:19.840987 |
SID: | 2027121 |
Source Port: | 40954 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15181.114.219.1084312475472023548 08/26/23-18:52:02.858015 |
SID: | 2023548 |
Source Port: | 43124 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15104.137.180.343418675472023548 08/26/23-18:52:20.513678 |
SID: | 2023548 |
Source Port: | 34186 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1524.232.41.2494235275472023548 08/26/23-18:52:18.379798 |
SID: | 2023548 |
Source Port: | 42352 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1514.2.61.154077875472023548 08/26/23-18:52:22.639231 |
SID: | 2023548 |
Source Port: | 40778 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15222.114.49.1414583875472023548 08/26/23-18:52:01.381062 |
SID: | 2023548 |
Source Port: | 45838 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1551.132.225.10740674802030092 08/26/23-18:52:06.207326 |
SID: | 2030092 |
Source Port: | 40674 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15189.130.100.2074158475472023548 08/26/23-18:52:20.679970 |
SID: | 2023548 |
Source Port: | 41584 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15125.153.39.1634773875472023548 08/26/23-18:52:02.399025 |
SID: | 2023548 |
Source Port: | 47738 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15112.182.150.914377875472023548 08/26/23-18:52:07.378771 |
SID: | 2023548 |
Source Port: | 43778 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1568.114.145.20850086802030092 08/26/23-18:52:17.252117 |
SID: | 2030092 |
Source Port: | 50086 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1595.179.167.17244032802027121 08/26/23-18:52:00.660026 |
SID: | 2027121 |
Source Port: | 44032 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1574.75.49.54420675472023548 08/26/23-18:52:20.662468 |
SID: | 2023548 |
Source Port: | 44206 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15212.29.212.24732868802835221 08/26/23-18:52:04.249453 |
SID: | 2835221 |
Source Port: | 32868 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1518.154.70.8054108802030092 08/26/23-18:52:18.852217 |
SID: | 2030092 |
Source Port: | 54108 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1574.75.49.54418275472023548 08/26/23-18:52:20.515157 |
SID: | 2023548 |
Source Port: | 44182 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15174.114.11.2316055275472023548 08/26/23-18:52:20.356410 |
SID: | 2023548 |
Source Port: | 60552 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1570.125.154.614788475472023548 08/26/23-18:52:05.206135 |
SID: | 2023548 |
Source Port: | 47884 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1547.147.14.1894661675472023548 08/26/23-18:52:17.178188 |
SID: | 2023548 |
Source Port: | 46616 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15121.149.114.1354404475472023548 08/26/23-18:52:22.729304 |
SID: | 2023548 |
Source Port: | 44044 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1595.62.220.9746898802027121 08/26/23-18:52:09.734754 |
SID: | 2027121 |
Source Port: | 46898 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1523.80.26.19935710802030092 08/26/23-18:52:19.231349 |
SID: | 2030092 |
Source Port: | 35710 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1532.223.118.893852475472023548 08/26/23-18:52:21.178338 |
SID: | 2023548 |
Source Port: | 38524 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1584.215.42.1825430075472023548 08/26/23-18:52:16.540240 |
SID: | 2023548 |
Source Port: | 54300 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15144.126.168.175845675472023548 08/26/23-18:52:02.230338 |
SID: | 2023548 |
Source Port: | 58456 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1592.27.90.9358128802030092 08/26/23-18:52:02.979977 |
SID: | 2030092 |
Source Port: | 58128 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1524.178.30.2445262075472023548 08/26/23-18:52:01.138601 |
SID: | 2023548 |
Source Port: | 52620 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15212.83.154.13843710802835221 08/26/23-18:52:18.200086 |
SID: | 2835221 |
Source Port: | 43710 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15200.37.104.755910275472023548 08/26/23-18:52:01.405513 |
SID: | 2023548 |
Source Port: | 59102 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15190.191.111.1395767875472023548 08/26/23-18:52:16.937121 |
SID: | 2023548 |
Source Port: | 57678 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15137.66.43.16340308555552841013 08/26/23-18:52:14.849397 |
SID: | 2841013 |
Source Port: | 40308 |
Destination Port: | 55555 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15118.63.12.1154203675472023548 08/26/23-18:52:02.393686 |
SID: | 2023548 |
Source Port: | 42036 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1595.141.35.14646570802027121 08/26/23-18:52:09.672129 |
SID: | 2027121 |
Source Port: | 46570 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1573.180.254.2504259875472023548 08/26/23-18:52:16.784377 |
SID: | 2023548 |
Source Port: | 42598 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1547.147.14.1894666675472023548 08/26/23-18:52:17.361044 |
SID: | 2023548 |
Source Port: | 46666 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1574.199.112.845465875472023548 08/26/23-18:52:02.104823 |
SID: | 2023548 |
Source Port: | 54658 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1534.43.210.206001075472023548 08/26/23-18:52:05.096912 |
SID: | 2023548 |
Source Port: | 60010 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1597.120.147.1195901475472023548 08/26/23-18:52:02.192016 |
SID: | 2023548 |
Source Port: | 59014 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1535.141.104.1845746275472023548 08/26/23-18:52:01.262618 |
SID: | 2023548 |
Source Port: | 57462 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1570.45.67.604250075472023548 08/26/23-18:52:01.141790 |
SID: | 2023548 |
Source Port: | 42500 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15168.138.50.17457076802030092 08/26/23-18:52:08.027035 |
SID: | 2030092 |
Source Port: | 57076 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15121.183.193.1075329075472023548 08/26/23-18:52:05.458556 |
SID: | 2023548 |
Source Port: | 53290 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15155.159.67.19445838802030092 08/26/23-18:52:17.379291 |
SID: | 2030092 |
Source Port: | 45838 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15104.137.180.343420475472023548 08/26/23-18:52:20.646204 |
SID: | 2023548 |
Source Port: | 34204 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15212.186.79.12052334802835221 08/26/23-18:52:15.846016 |
SID: | 2835221 |
Source Port: | 52334 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1586.170.194.2544045075472023548 08/26/23-18:52:18.142149 |
SID: | 2023548 |
Source Port: | 40450 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1588.221.135.8944002802027121 08/26/23-18:52:16.348074 |
SID: | 2027121 |
Source Port: | 44002 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15212.33.71.441306802835221 08/26/23-18:52:18.172736 |
SID: | 2835221 |
Source Port: | 41306 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1597.120.147.1195894275472023548 08/26/23-18:52:01.279153 |
SID: | 2023548 |
Source Port: | 58942 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1571.223.37.1933339275472023548 08/26/23-18:52:05.081305 |
SID: | 2023548 |
Source Port: | 33392 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1523.53.86.2440368802030092 08/26/23-18:52:22.318207 |
SID: | 2030092 |
Source Port: | 40368 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15121.188.30.1484789875472023548 08/26/23-18:52:01.381738 |
SID: | 2023548 |
Source Port: | 47898 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1524.181.92.615674475472023548 08/26/23-18:52:05.182958 |
SID: | 2023548 |
Source Port: | 56744 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15109.36.92.2313968075472023548 08/26/23-18:51:59.710779 |
SID: | 2023548 |
Source Port: | 39680 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1547.149.164.1954584075472023548 08/26/23-18:52:20.659957 |
SID: | 2023548 |
Source Port: | 45840 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1595.98.35.9742066802027121 08/26/23-18:52:21.092493 |
SID: | 2027121 |
Source Port: | 42066 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1595.154.74.19337116802027121 08/26/23-18:52:09.955759 |
SID: | 2027121 |
Source Port: | 37116 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15104.94.61.25135302802030092 08/26/23-18:52:03.480874 |
SID: | 2030092 |
Source Port: | 35302 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1547.145.62.1914212675472023548 08/26/23-18:52:07.389444 |
SID: | 2023548 |
Source Port: | 42126 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15109.33.117.2465644675472023548 08/26/23-18:51:59.649118 |
SID: | 2023548 |
Source Port: | 56446 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15108.167.191.14233348802030092 08/26/23-18:52:02.193484 |
SID: | 2030092 |
Source Port: | 33348 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1514.84.61.135591075472023548 08/26/23-18:52:05.179203 |
SID: | 2023548 |
Source Port: | 55910 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15212.76.119.13759928802835221 08/26/23-18:52:18.201800 |
SID: | 2835221 |
Source Port: | 59928 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15191.191.41.363827475472023548 08/26/23-18:52:05.393581 |
SID: | 2023548 |
Source Port: | 38274 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15213.16.204.15639618802030092 08/26/23-18:52:21.092766 |
SID: | 2030092 |
Source Port: | 39618 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1523.4.235.7047902802030092 08/26/23-18:52:17.190854 |
SID: | 2030092 |
Source Port: | 47902 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1514.64.123.2064105875472023548 08/26/23-18:52:00.929055 |
SID: | 2023548 |
Source Port: | 41058 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15174.114.11.2316056875472023548 08/26/23-18:52:20.476509 |
SID: | 2023548 |
Source Port: | 60568 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1581.150.155.444570075472023548 08/26/23-18:52:18.156627 |
SID: | 2023548 |
Source Port: | 45700 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1595.70.251.9247608802027121 08/26/23-18:52:19.901025 |
SID: | 2027121 |
Source Port: | 47608 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1541.99.89.2124412875472023548 08/26/23-18:52:18.118803 |
SID: | 2023548 |
Source Port: | 44128 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15184.29.210.22040858802030092 08/26/23-18:52:00.166485 |
SID: | 2030092 |
Source Port: | 40858 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15181.168.253.1815868475472023548 08/26/23-18:52:21.880858 |
SID: | 2023548 |
Source Port: | 58684 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15184.15.82.1715848475472023548 08/26/23-18:52:20.374536 |
SID: | 2023548 |
Source Port: | 58484 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15177.135.82.814199075472023548 08/26/23-18:52:01.552666 |
SID: | 2023548 |
Source Port: | 41990 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1595.168.221.14432952802027121 08/26/23-18:52:19.867323 |
SID: | 2027121 |
Source Port: | 32952 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15191.191.41.363830075472023548 08/26/23-18:52:05.653164 |
SID: | 2023548 |
Source Port: | 38300 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15121.175.174.1284844075472023548 08/26/23-18:52:05.711797 |
SID: | 2023548 |
Source Port: | 48440 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1524.178.30.2445265875472023548 08/26/23-18:52:01.310374 |
SID: | 2023548 |
Source Port: | 52658 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1595.30.231.254386075472023548 08/26/23-18:52:02.079634 |
SID: | 2023548 |
Source Port: | 43860 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1547.152.242.1495675075472023548 08/26/23-18:52:22.539154 |
SID: | 2023548 |
Source Port: | 56750 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15218.151.73.2214985675472023548 08/26/23-18:52:22.745661 |
SID: | 2023548 |
Source Port: | 49856 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15181.71.87.653451675472023548 08/26/23-18:52:01.359254 |
SID: | 2023548 |
Source Port: | 34516 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1523.2.235.22055708802835221 08/26/23-18:52:15.766948 |
SID: | 2835221 |
Source Port: | 55708 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15183.106.113.844508675472023548 08/26/23-18:52:17.644000 |
SID: | 2023548 |
Source Port: | 45086 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15189.19.114.1715119075472023548 08/26/23-18:52:02.443038 |
SID: | 2023548 |
Source Port: | 51190 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15152.44.51.1365652675472023548 08/26/23-18:52:05.023993 |
SID: | 2023548 |
Source Port: | 56526 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15119.214.183.83415680802835221 08/26/23-18:52:07.980080 |
SID: | 2835221 |
Source Port: | 34156 |
Destination Port: | 8080 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15191.61.41.6337650802030092 08/26/23-18:52:22.679686 |
SID: | 2030092 |
Source Port: | 37650 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1597.120.147.1195896475472023548 08/26/23-18:52:01.459851 |
SID: | 2023548 |
Source Port: | 58964 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15181.114.219.1084310675472023548 08/26/23-18:52:02.569677 |
SID: | 2023548 |
Source Port: | 43106 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15221.158.244.874971675472023548 08/26/23-18:52:21.715566 |
SID: | 2023548 |
Source Port: | 49716 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1595.56.121.3844946802027121 08/26/23-18:52:03.499123 |
SID: | 2027121 |
Source Port: | 44946 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1595.210.68.1253268802027121 08/26/23-18:52:04.544584 |
SID: | 2027121 |
Source Port: | 53268 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1575.161.208.953607875472023548 08/26/23-18:52:07.495051 |
SID: | 2023548 |
Source Port: | 36078 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1572.52.250.454614802030092 08/26/23-18:51:59.886682 |
SID: | 2030092 |
Source Port: | 54614 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15212.227.161.20936242802835221 08/26/23-18:52:04.180357 |
SID: | 2835221 |
Source Port: | 36242 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15200.185.231.1895960675472023548 08/26/23-18:52:07.270086 |
SID: | 2023548 |
Source Port: | 59606 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1547.226.153.493677275472023548 08/26/23-18:52:07.093896 |
SID: | 2023548 |
Source Port: | 36772 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15115.17.20.1155993275472023548 08/26/23-18:52:02.112080 |
SID: | 2023548 |
Source Port: | 59932 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15174.85.122.439330802030092 08/26/23-18:52:02.206104 |
SID: | 2030092 |
Source Port: | 39330 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1577.56.217.1104208275472023548 08/26/23-18:52:02.075592 |
SID: | 2023548 |
Source Port: | 42082 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1578.130.105.1745425275472023548 08/26/23-18:52:16.679592 |
SID: | 2023548 |
Source Port: | 54252 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15184.24.210.16243068802030092 08/26/23-18:52:02.544046 |
SID: | 2030092 |
Source Port: | 43068 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1541.109.27.674408275472023548 08/26/23-18:52:02.143989 |
SID: | 2023548 |
Source Port: | 44082 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1551.15.196.19543868802030092 08/26/23-18:51:59.914062 |
SID: | 2030092 |
Source Port: | 43868 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15194.36.147.13756714802030092 08/26/23-18:52:03.949824 |
SID: | 2030092 |
Source Port: | 56714 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15212.3.155.18752156802835221 08/26/23-18:52:08.319380 |
SID: | 2835221 |
Source Port: | 52156 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1595.56.121.3845204802027121 08/26/23-18:52:07.444540 |
SID: | 2027121 |
Source Port: | 45204 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15118.60.69.364451675472023548 08/26/23-18:52:12.401318 |
SID: | 2023548 |
Source Port: | 44516 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1595.173.190.12045992802027121 08/26/23-18:52:09.796232 |
SID: | 2027121 |
Source Port: | 45992 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1576.184.150.103558875472023548 08/26/23-18:52:16.880786 |
SID: | 2023548 |
Source Port: | 35588 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15121.188.192.1855106675472023548 08/26/23-18:52:20.520036 |
SID: | 2023548 |
Source Port: | 51066 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1597.124.240.1593797475472023548 08/26/23-18:52:01.106329 |
SID: | 2023548 |
Source Port: | 37974 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1587.233.96.23256756802030092 08/26/23-18:52:15.957325 |
SID: | 2030092 |
Source Port: | 56756 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1594.152.176.3936528802030092 08/26/23-18:52:08.211132 |
SID: | 2030092 |
Source Port: | 36528 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1541.237.54.1635686475472023548 08/26/23-18:52:16.719972 |
SID: | 2023548 |
Source Port: | 56864 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1567.197.186.1193876475472023548 08/26/23-18:52:00.795446 |
SID: | 2023548 |
Source Port: | 38764 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15121.137.118.975378475472023548 08/26/23-18:52:17.654659 |
SID: | 2023548 |
Source Port: | 53784 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15212.76.101.4437176802835221 08/26/23-18:52:00.850417 |
SID: | 2835221 |
Source Port: | 37176 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1570.114.119.2335451675472023548 08/26/23-18:52:05.225960 |
SID: | 2023548 |
Source Port: | 54516 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.152.88.11.1763852875472023548 08/26/23-18:52:02.176905 |
SID: | 2023548 |
Source Port: | 38528 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15201.231.83.113832675472023548 08/26/23-18:52:22.440568 |
SID: | 2023548 |
Source Port: | 38326 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15200.185.231.1895964275472023548 08/26/23-18:52:07.531483 |
SID: | 2023548 |
Source Port: | 59642 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1594.196.24.1003614475472023548 08/26/23-18:52:18.111078 |
SID: | 2023548 |
Source Port: | 36144 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15191.176.3.163884875472023548 08/26/23-18:52:16.899803 |
SID: | 2023548 |
Source Port: | 38848 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1547.149.164.1954586875472023548 08/26/23-18:52:20.856121 |
SID: | 2023548 |
Source Port: | 45868 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15190.244.72.1905959875472023548 08/26/23-18:52:16.952012 |
SID: | 2023548 |
Source Port: | 59598 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15216.10.175.2254741275472023548 08/26/23-18:52:02.348452 |
SID: | 2023548 |
Source Port: | 47412 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1573.180.254.2504257675472023548 08/26/23-18:52:16.659536 |
SID: | 2023548 |
Source Port: | 42576 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15128.14.67.16253190802030092 08/26/23-18:52:06.436364 |
SID: | 2030092 |
Source Port: | 53190 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15177.135.82.814195275472023548 08/26/23-18:52:01.305172 |
SID: | 2023548 |
Source Port: | 41952 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1597.112.99.694350075472023548 08/26/23-18:52:05.221305 |
SID: | 2023548 |
Source Port: | 43500 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1595.216.217.3644530802027121 08/26/23-18:52:09.660181 |
SID: | 2027121 |
Source Port: | 44530 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1545.79.196.8648332802835221 08/26/23-18:52:07.462389 |
SID: | 2835221 |
Source Port: | 48332 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15189.122.34.1403379075472023548 08/26/23-18:52:20.927965 |
SID: | 2023548 |
Source Port: | 33790 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15121.137.118.975385475472023548 08/26/23-18:52:18.663697 |
SID: | 2023548 |
Source Port: | 53854 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15118.173.214.1825584675472023548 08/26/23-18:52:06.727995 |
SID: | 2023548 |
Source Port: | 55846 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1570.125.154.614784875472023548 08/26/23-18:52:05.044967 |
SID: | 2023548 |
Source Port: | 47848 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1566.66.152.8959416802030092 08/26/23-18:52:06.305504 |
SID: | 2030092 |
Source Port: | 59416 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1554.157.15.7156614802030092 08/26/23-18:52:18.950682 |
SID: | 2030092 |
Source Port: | 56614 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15217.64.195.18748660802030092 08/26/23-18:52:17.115209 |
SID: | 2030092 |
Source Port: | 48660 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15121.183.193.1075316075472023548 08/26/23-18:52:05.177363 |
SID: | 2023548 |
Source Port: | 53160 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15198.27.100.10739488802030092 08/26/23-18:52:18.939925 |
SID: | 2030092 |
Source Port: | 39488 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1550.107.161.2064890675472023548 08/26/23-18:52:22.437332 |
SID: | 2023548 |
Source Port: | 48906 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1595.217.104.9351984802027121 08/26/23-18:52:09.660060 |
SID: | 2027121 |
Source Port: | 51984 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15181.165.178.1764359475472023548 08/26/23-18:52:12.693681 |
SID: | 2023548 |
Source Port: | 43594 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1513.249.71.19850834802030092 08/26/23-18:52:07.102634 |
SID: | 2030092 |
Source Port: | 50834 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15172.76.41.114838475472023548 08/26/23-18:52:05.327113 |
SID: | 2023548 |
Source Port: | 48384 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1599.226.45.993553075472023548 08/26/23-18:52:17.047619 |
SID: | 2023548 |
Source Port: | 35530 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1523.7.162.13056638802030092 08/26/23-18:52:02.657748 |
SID: | 2030092 |
Source Port: | 56638 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1550.111.214.1525169275472023548 08/26/23-18:52:06.638998 |
SID: | 2023548 |
Source Port: | 51692 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1547.145.62.1914208875472023548 08/26/23-18:52:07.198388 |
SID: | 2023548 |
Source Port: | 42088 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15121.175.174.1284841675472023548 08/26/23-18:52:05.434509 |
SID: | 2023548 |
Source Port: | 48416 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1575.118.196.1884510875472023548 08/26/23-18:52:17.226274 |
SID: | 2023548 |
Source Port: | 45108 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15104.206.200.8359904802030092 08/26/23-18:52:04.043771 |
SID: | 2030092 |
Source Port: | 59904 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.152.69.151.514786275472023548 08/26/23-18:52:07.008101 |
SID: | 2023548 |
Source Port: | 47862 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15104.20.231.14040084802030092 08/26/23-18:52:12.686180 |
SID: | 2030092 |
Source Port: | 40084 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15181.81.6.2463393275472023548 08/26/23-18:52:18.676940 |
SID: | 2023548 |
Source Port: | 33932 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1524.232.41.2494238675472023548 08/26/23-18:52:18.665768 |
SID: | 2023548 |
Source Port: | 42386 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15104.104.14.532996802835221 08/26/23-18:52:15.915401 |
SID: | 2835221 |
Source Port: | 32996 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1547.39.245.2445502675472023548 08/26/23-18:52:06.636535 |
SID: | 2023548 |
Source Port: | 55026 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1547.39.245.2445503675472023548 08/26/23-18:52:06.778452 |
SID: | 2023548 |
Source Port: | 55036 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1594.102.214.15333450802030092 08/26/23-18:52:12.669112 |
SID: | 2030092 |
Source Port: | 33450 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15142.129.216.1514587475472023548 08/26/23-18:52:12.382669 |
SID: | 2023548 |
Source Port: | 45874 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1523.67.132.23053462802030092 08/26/23-18:52:17.107130 |
SID: | 2030092 |
Source Port: | 53462 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1588.99.184.10556666802027121 08/26/23-18:52:09.880582 |
SID: | 2027121 |
Source Port: | 56666 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1534.149.32.11456344802030092 08/26/23-18:51:59.565160 |
SID: | 2030092 |
Source Port: | 56344 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15185.251.204.15652840802030092 08/26/23-18:52:12.740566 |
SID: | 2030092 |
Source Port: | 52840 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1514.34.28.1825825675472023548 08/26/23-18:52:21.719994 |
SID: | 2023548 |
Source Port: | 58256 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15212.15.65.13139550802835221 08/26/23-18:52:00.958030 |
SID: | 2835221 |
Source Port: | 39550 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1552.0.139.15253666802030092 08/26/23-18:52:21.215064 |
SID: | 2030092 |
Source Port: | 53666 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1534.107.178.774557675472023548 08/26/23-18:52:11.888115 |
SID: | 2023548 |
Source Port: | 45576 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15192.143.80.44213075472023548 08/26/23-18:52:17.783092 |
SID: | 2023548 |
Source Port: | 42130 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15189.195.141.14238496802030092 08/26/23-18:52:22.583634 |
SID: | 2030092 |
Source Port: | 38496 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1571.223.37.1933351475472023548 08/26/23-18:52:06.273090 |
SID: | 2023548 |
Source Port: | 33514 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1585.95.173.20547334802030092 08/26/23-18:52:22.178583 |
SID: | 2030092 |
Source Port: | 47334 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15172.65.37.21144316555552841013 08/26/23-18:52:07.350783 |
SID: | 2841013 |
Source Port: | 44316 |
Destination Port: | 55555 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1572.224.29.455531875472023548 08/26/23-18:52:05.028391 |
SID: | 2023548 |
Source Port: | 55318 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1579.149.143.265847275472023548 08/26/23-18:52:11.953920 |
SID: | 2023548 |
Source Port: | 58472 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15173.35.175.1654464275472023548 08/26/23-18:52:12.074446 |
SID: | 2023548 |
Source Port: | 44642 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1537.104.123.154936675472023548 08/26/23-18:52:16.713439 |
SID: | 2023548 |
Source Port: | 49366 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15121.163.148.1854184275472023548 08/26/23-18:52:16.715146 |
SID: | 2023548 |
Source Port: | 41842 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1537.147.160.2145941075472023548 08/26/23-18:52:06.638826 |
SID: | 2023548 |
Source Port: | 59410 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1588.147.145.11056558802027121 08/26/23-18:52:16.396327 |
SID: | 2027121 |
Source Port: | 56558 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15103.193.244.1505729475472023548 08/26/23-18:52:05.204074 |
SID: | 2023548 |
Source Port: | 57294 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15189.46.14.614967475472023548 08/26/23-18:52:17.153759 |
SID: | 2023548 |
Source Port: | 49674 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1535.141.104.1845742675472023548 08/26/23-18:52:01.113771 |
SID: | 2023548 |
Source Port: | 57426 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15115.0.50.1654288675472023548 08/26/23-18:52:12.399936 |
SID: | 2023548 |
Source Port: | 42886 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15194.163.34.14333048802835221 08/26/23-18:52:18.455677 |
SID: | 2835221 |
Source Port: | 33048 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1570.114.119.2335447875472023548 08/26/23-18:52:05.050377 |
SID: | 2023548 |
Source Port: | 54478 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1586.151.153.714535075472023548 08/26/23-18:52:16.592831 |
SID: | 2023548 |
Source Port: | 45350 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15190.190.12.863975075472023548 08/26/23-18:52:17.564563 |
SID: | 2023548 |
Source Port: | 39750 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.158.209.78.7444028802030092 08/26/23-18:52:15.030331 |
SID: | 2030092 |
Source Port: | 44028 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15181.169.130.1174427475472023548 08/26/23-18:52:01.381257 |
SID: | 2023548 |
Source Port: | 44274 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15103.149.90.15155816802030092 08/26/23-18:52:07.208820 |
SID: | 2030092 |
Source Port: | 55816 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1595.217.198.13644944802027121 08/26/23-18:52:09.700184 |
SID: | 2027121 |
Source Port: | 44944 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1588.83.99.25155428802027121 08/26/23-18:52:07.485894 |
SID: | 2027121 |
Source Port: | 55428 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15137.25.136.1675095675472023548 08/26/23-18:52:20.680142 |
SID: | 2023548 |
Source Port: | 50956 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15175.242.87.2363752275472023548 08/26/23-18:52:22.474774 |
SID: | 2023548 |
Source Port: | 37522 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15183.124.119.1803468075472023548 08/26/23-18:52:17.369466 |
SID: | 2023548 |
Source Port: | 34680 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15146.148.219.21553580802030092 08/26/23-18:52:02.165344 |
SID: | 2030092 |
Source Port: | 53580 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15119.216.119.644829075472023548 08/26/23-18:52:07.649920 |
SID: | 2023548 |
Source Port: | 48290 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15121.149.18.444575275472023548 08/26/23-18:52:12.683328 |
SID: | 2023548 |
Source Port: | 45752 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15208.101.95.2154386875472023548 08/26/23-18:51:59.890543 |
SID: | 2023548 |
Source Port: | 43868 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1554.174.91.11955612802030092 08/26/23-18:52:03.052345 |
SID: | 2030092 |
Source Port: | 55612 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15121.149.18.444573275472023548 08/26/23-18:52:12.400376 |
SID: | 2023548 |
Source Port: | 45732 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15116.202.222.5054938802030092 08/26/23-18:52:06.198618 |
SID: | 2030092 |
Source Port: | 54938 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1569.202.190.293920075472023548 08/26/23-18:52:21.154172 |
SID: | 2023548 |
Source Port: | 39200 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15212.103.62.23149110802030092 08/26/23-18:52:06.330564 |
SID: | 2030092 |
Source Port: | 49110 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1588.198.227.14049590802027121 08/26/23-18:52:04.567193 |
SID: | 2027121 |
Source Port: | 49590 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15197.10.162.1724331475472023548 08/26/23-18:52:11.937864 |
SID: | 2023548 |
Source Port: | 43314 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15212.232.61.17843970802835221 08/26/23-18:51:59.531757 |
SID: | 2835221 |
Source Port: | 43970 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15107.158.146.14656808802030092 08/26/23-18:52:03.795952 |
SID: | 2030092 |
Source Port: | 56808 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15121.188.192.1855110275472023548 08/26/23-18:52:20.813262 |
SID: | 2023548 |
Source Port: | 51102 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15191.55.17.1404341275472023548 08/26/23-18:52:16.950646 |
SID: | 2023548 |
Source Port: | 43412 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15181.81.6.2463388275472023548 08/26/23-18:52:18.387883 |
SID: | 2023548 |
Source Port: | 33882 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15200.127.70.2285285275472023548 08/26/23-18:52:21.411866 |
SID: | 2023548 |
Source Port: | 52852 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1567.197.186.1193887275472023548 08/26/23-18:52:01.964830 |
SID: | 2023548 |
Source Port: | 38872 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1586.144.55.2245945075472023548 08/26/23-18:52:11.913699 |
SID: | 2023548 |
Source Port: | 59450 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1595.100.234.16659462802027121 08/26/23-18:52:06.213103 |
SID: | 2027121 |
Source Port: | 59462 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1595.164.86.18948034802027121 08/26/23-18:52:09.650093 |
SID: | 2027121 |
Source Port: | 48034 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1514.34.28.1825823475472023548 08/26/23-18:52:21.438000 |
SID: | 2023548 |
Source Port: | 58234 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15212.83.36.14435536802835221 08/26/23-18:52:12.425719 |
SID: | 2835221 |
Source Port: | 35536 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1541.225.247.6844834802835221 08/26/23-18:52:15.842261 |
SID: | 2835221 |
Source Port: | 44834 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15212.76.105.16059614802835221 08/26/23-18:52:00.850577 |
SID: | 2835221 |
Source Port: | 59614 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15112.179.77.525722675472023548 08/26/23-18:52:17.287525 |
SID: | 2023548 |
Source Port: | 57226 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15188.28.235.1993410675472023548 08/26/23-18:52:20.479976 |
SID: | 2023548 |
Source Port: | 34106 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15222.114.49.1414587475472023548 08/26/23-18:52:01.662107 |
SID: | 2023548 |
Source Port: | 45874 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15186.210.202.833891675472023548 08/26/23-18:52:12.615294 |
SID: | 2023548 |
Source Port: | 38916 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1578.130.105.1745428075472023548 08/26/23-18:52:16.754490 |
SID: | 2023548 |
Source Port: | 54280 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15187.232.236.1373469675472023548 08/26/23-18:52:01.005789 |
SID: | 2023548 |
Source Port: | 34696 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1599.229.154.2214168075472023548 08/26/23-18:52:01.954358 |
SID: | 2023548 |
Source Port: | 41680 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15184.15.82.1715850275472023548 08/26/23-18:52:20.513587 |
SID: | 2023548 |
Source Port: | 58502 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1547.156.110.893598475472023548 08/26/23-18:52:01.467397 |
SID: | 2023548 |
Source Port: | 35984 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1551.178.76.5446770802030092 08/26/23-18:52:06.975306 |
SID: | 2030092 |
Source Port: | 46770 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15190.244.72.1905964475472023548 08/26/23-18:52:17.216544 |
SID: | 2023548 |
Source Port: | 59644 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1595.78.162.16346892802027121 08/26/23-18:52:16.580496 |
SID: | 2027121 |
Source Port: | 46892 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1537.104.123.154934475472023548 08/26/23-18:52:16.620223 |
SID: | 2023548 |
Source Port: | 49344 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1523.57.224.20148464802030092 08/26/23-18:51:59.906940 |
SID: | 2030092 |
Source Port: | 48464 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15191.176.3.163890475472023548 08/26/23-18:52:17.131114 |
SID: | 2023548 |
Source Port: | 38904 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1560.242.26.2044043875472023548 08/26/23-18:52:21.417420 |
SID: | 2023548 |
Source Port: | 40438 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1523.200.239.23944810802030092 08/26/23-18:51:59.913946 |
SID: | 2030092 |
Source Port: | 44810 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1554.94.0.24741002802030092 08/26/23-18:52:15.241620 |
SID: | 2030092 |
Source Port: | 41002 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15104.24.206.14643790802030092 08/26/23-18:52:15.026048 |
SID: | 2030092 |
Source Port: | 43790 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15190.190.12.863969275472023548 08/26/23-18:52:17.306595 |
SID: | 2023548 |
Source Port: | 39692 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1595.100.223.25248298802027121 08/26/23-18:52:09.732113 |
SID: | 2027121 |
Source Port: | 48298 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1595.85.233.333584802027121 08/26/23-18:52:21.114925 |
SID: | 2027121 |
Source Port: | 33584 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15107.154.148.2940136555552841013 08/26/23-18:52:07.350300 |
SID: | 2841013 |
Source Port: | 40136 |
Destination Port: | 55555 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1518.160.98.2348490802030092 08/26/23-18:51:59.884208 |
SID: | 2030092 |
Source Port: | 48490 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1596.6.223.356650802030092 08/26/23-18:52:22.336757 |
SID: | 2030092 |
Source Port: | 56650 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1597.124.240.1593810275472023548 08/26/23-18:52:01.283573 |
SID: | 2023548 |
Source Port: | 38102 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1596.64.13.8449780802030092 08/26/23-18:52:02.138181 |
SID: | 2030092 |
Source Port: | 49780 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1523.44.165.7840548802835221 08/26/23-18:52:07.588292 |
SID: | 2835221 |
Source Port: | 40548 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15200.162.245.553299875472023548 08/26/23-18:52:22.407687 |
SID: | 2023548 |
Source Port: | 32998 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15183.124.119.1803473675472023548 08/26/23-18:52:17.653379 |
SID: | 2023548 |
Source Port: | 34736 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15187.232.236.1373458875472023548 08/26/23-18:52:00.821461 |
SID: | 2023548 |
Source Port: | 34588 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15112.161.147.20438520802027121 08/26/23-18:52:00.947331 |
SID: | 2027121 |
Source Port: | 38520 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1595.30.231.254388475472023548 08/26/23-18:52:02.143059 |
SID: | 2023548 |
Source Port: | 43884 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15149.109.111.2335946475472023548 08/26/23-18:52:16.528593 |
SID: | 2023548 |
Source Port: | 59464 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1545.181.54.04565475472023548 08/26/23-18:52:07.436429 |
SID: | 2023548 |
Source Port: | 45654 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1585.100.119.1713670875472023548 08/26/23-18:52:10.754638 |
SID: | 2023548 |
Source Port: | 36708 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1595.30.250.8234924802027121 08/26/23-18:52:21.058491 |
SID: | 2027121 |
Source Port: | 34924 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1514.71.253.2046092875472023548 08/26/23-18:52:18.664973 |
SID: | 2023548 |
Source Port: | 60928 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15139.59.228.540648802030092 08/26/23-18:52:03.212874 |
SID: | 2030092 |
Source Port: | 40648 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1514.58.214.393555875472023548 08/26/23-18:52:22.474953 |
SID: | 2023548 |
Source Port: | 35558 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15181.165.178.1764357675472023548 08/26/23-18:52:12.402032 |
SID: | 2023548 |
Source Port: | 43576 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15112.179.51.675620875472023548 08/26/23-18:52:16.995977 |
SID: | 2023548 |
Source Port: | 56208 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15183.108.7.643982075472023548 08/26/23-18:52:02.108099 |
SID: | 2023548 |
Source Port: | 39820 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15186.6.152.7443042802835221 08/26/23-18:52:15.924618 |
SID: | 2835221 |
Source Port: | 43042 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15207.155.63.1024098875472023548 08/26/23-18:52:01.269452 |
SID: | 2023548 |
Source Port: | 40988 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1538.173.105.13458558802030092 08/26/23-18:52:08.380713 |
SID: | 2030092 |
Source Port: | 58558 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1559.6.103.2105890875472023548 08/26/23-18:52:17.653310 |
SID: | 2023548 |
Source Port: | 58908 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1523.212.94.25147494802030092 08/26/23-18:52:06.608417 |
SID: | 2030092 |
Source Port: | 47494 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1595.70.194.14049398802027121 08/26/23-18:52:19.901060 |
SID: | 2027121 |
Source Port: | 49398 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15172.76.41.114833675472023548 08/26/23-18:52:05.183158 |
SID: | 2023548 |
Source Port: | 48336 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1575.161.208.953600675472023548 08/26/23-18:52:06.277318 |
SID: | 2023548 |
Source Port: | 36006 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15203.154.135.17050414802030092 08/26/23-18:52:02.192491 |
SID: | 2030092 |
Source Port: | 50414 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1547.226.153.493684075472023548 08/26/23-18:52:07.239634 |
SID: | 2023548 |
Source Port: | 36840 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15220.81.122.1944055075472023548 08/26/23-18:52:21.711441 |
SID: | 2023548 |
Source Port: | 40550 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15216.10.175.2254737675472023548 08/26/23-18:52:02.217782 |
SID: | 2023548 |
Source Port: | 47376 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15185.93.166.2653634802030092 08/26/23-18:52:06.445833 |
SID: | 2030092 |
Source Port: | 53634 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1571.95.59.1855621675472023548 08/26/23-18:52:21.230094 |
SID: | 2023548 |
Source Port: | 56216 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15183.108.7.643999475472023548 08/26/23-18:52:02.389341 |
SID: | 2023548 |
Source Port: | 39994 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15221.158.244.874969875472023548 08/26/23-18:52:21.433926 |
SID: | 2023548 |
Source Port: | 49698 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1588.209.160.1554578802027121 08/26/23-18:52:10.018881 |
SID: | 2027121 |
Source Port: | 54578 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1520.70.125.15851670802030092 08/26/23-18:52:17.536831 |
SID: | 2030092 |
Source Port: | 51670 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1572.195.216.1063433075472023548 08/26/23-18:52:05.226407 |
SID: | 2023548 |
Source Port: | 34330 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15125.153.39.1634756275472023548 08/26/23-18:52:02.110590 |
SID: | 2023548 |
Source Port: | 47562 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15152.254.192.1395687475472023548 08/26/23-18:52:22.679865 |
SID: | 2023548 |
Source Port: | 56874 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1595.156.188.8333668802027121 08/26/23-18:52:06.220392 |
SID: | 2027121 |
Source Port: | 33668 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15188.235.216.1963797675472023548 08/26/23-18:52:01.954242 |
SID: | 2023548 |
Source Port: | 37976 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1572.224.29.455541875472023548 08/26/23-18:52:05.159961 |
SID: | 2023548 |
Source Port: | 55418 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1571.95.59.1855626675472023548 08/26/23-18:52:21.438824 |
SID: | 2023548 |
Source Port: | 56266 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1545.181.54.04561475472023548 08/26/23-18:52:07.222681 |
SID: | 2023548 |
Source Port: | 45614 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1579.149.143.265849875472023548 08/26/23-18:52:12.064568 |
SID: | 2023548 |
Source Port: | 58498 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1595.79.101.11946050802027121 08/26/23-18:52:21.190548 |
SID: | 2027121 |
Source Port: | 46050 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15181.71.87.653437875472023548 08/26/23-18:52:01.154006 |
SID: | 2023548 |
Source Port: | 34378 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1541.237.54.1635684275472023548 08/26/23-18:52:16.623136 |
SID: | 2023548 |
Source Port: | 56842 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1552.3.21.2458638802030092 08/26/23-18:52:02.258513 |
SID: | 2030092 |
Source Port: | 58638 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1575.118.196.1884507075472023548 08/26/23-18:52:17.088828 |
SID: | 2023548 |
Source Port: | 45070 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15118.48.154.1675479675472023548 08/26/23-18:52:17.276284 |
SID: | 2023548 |
Source Port: | 54796 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1597.112.99.694353475472023548 08/26/23-18:52:05.399154 |
SID: | 2023548 |
Source Port: | 43534 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1595.6.69.23935282802027121 08/26/23-18:52:16.422586 |
SID: | 2027121 |
Source Port: | 35282 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1588.221.78.11335202802027121 08/26/23-18:52:07.468834 |
SID: | 2027121 |
Source Port: | 35202 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15184.103.165.1216036875472023548 08/26/23-18:52:02.018576 |
SID: | 2023548 |
Source Port: | 60368 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15174.30.72.1183732675472023548 08/26/23-18:52:01.338652 |
SID: | 2023548 |
Source Port: | 37326 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15173.35.175.1654465875472023548 08/26/23-18:52:12.193889 |
SID: | 2023548 |
Source Port: | 44658 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15118.63.12.1154185675472023548 08/26/23-18:52:02.109073 |
SID: | 2023548 |
Source Port: | 41856 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15188.235.216.1963811075472023548 08/26/23-18:52:02.079224 |
SID: | 2023548 |
Source Port: | 38110 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1561.75.75.313916875472023548 08/26/23-18:52:02.565077 |
SID: | 2023548 |
Source Port: | 39168 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15200.162.206.2154054875472023548 08/26/23-18:52:05.141310 |
SID: | 2023548 |
Source Port: | 40548 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1595.173.190.12045958802027121 08/26/23-18:52:09.684771 |
SID: | 2027121 |
Source Port: | 45958 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15121.165.156.11343478802030092 08/26/23-18:52:17.533902 |
SID: | 2030092 |
Source Port: | 43478 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15212.129.10.850628802835221 08/26/23-18:52:00.956341 |
SID: | 2835221 |
Source Port: | 50628 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1595.143.84.10442698802027121 08/26/23-18:52:00.968038 |
SID: | 2027121 |
Source Port: | 42698 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15152.170.97.1384277875472023548 08/26/23-18:52:16.694344 |
SID: | 2023548 |
Source Port: | 42778 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15118.173.214.1825586475472023548 08/26/23-18:52:06.946924 |
SID: | 2023548 |
Source Port: | 55864 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1586.133.18.15942108802835221 08/26/23-18:52:07.347873 |
SID: | 2835221 |
Source Port: | 42108 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1534.111.193.433971875472023548 08/26/23-18:52:06.508676 |
SID: | 2023548 |
Source Port: | 39718 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.152.69.62.195306675472023548 08/26/23-18:52:02.073649 |
SID: | 2023548 |
Source Port: | 53066 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15115.0.50.1654290275472023548 08/26/23-18:52:12.683482 |
SID: | 2023548 |
Source Port: | 42902 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1569.202.206.495567275472023548 08/26/23-18:52:20.478274 |
SID: | 2023548 |
Source Port: | 55672 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15109.33.117.2465646675472023548 08/26/23-18:51:59.680252 |
SID: | 2023548 |
Source Port: | 56466 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1550.106.143.1615489075472023548 08/26/23-18:52:18.045604 |
SID: | 2023548 |
Source Port: | 54890 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1537.147.160.2145940075472023548 08/26/23-18:52:06.564506 |
SID: | 2023548 |
Source Port: | 59400 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1571.7.99.2036039275472023548 08/26/23-18:52:16.698852 |
SID: | 2023548 |
Source Port: | 60392 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15112.157.211.20034400802027121 08/26/23-18:52:00.931008 |
SID: | 2027121 |
Source Port: | 34400 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.152.135.60.9451128802835221 08/26/23-18:52:15.882110 |
SID: | 2835221 |
Source Port: | 51128 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15188.28.235.1993409275472023548 08/26/23-18:52:20.408461 |
SID: | 2023548 |
Source Port: | 34092 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1585.100.119.1713675075472023548 08/26/23-18:52:10.819916 |
SID: | 2023548 |
Source Port: | 36750 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1523.206.5.6035876802030092 08/26/23-18:52:02.323979 |
SID: | 2030092 |
Source Port: | 35876 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15190.191.111.1395772475472023548 08/26/23-18:52:17.196192 |
SID: | 2023548 |
Source Port: | 57724 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15156.240.15.13747972802030092 08/26/23-18:52:19.240719 |
SID: | 2030092 |
Source Port: | 47972 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1595.101.221.22046624802027121 08/26/23-18:52:19.936853 |
SID: | 2027121 |
Source Port: | 46624 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1518.64.21.19259284802030092 08/26/23-18:52:22.571126 |
SID: | 2030092 |
Source Port: | 59284 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1547.156.110.893595875472023548 08/26/23-18:52:01.282807 |
SID: | 2023548 |
Source Port: | 35958 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15139.144.235.13649620802030092 08/26/23-18:51:59.755865 |
SID: | 2030092 |
Source Port: | 49620 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1595.142.202.21452826802027121 08/26/23-18:52:04.876427 |
SID: | 2027121 |
Source Port: | 52826 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1595.211.228.23744490802027121 08/26/23-18:52:00.992492 |
SID: | 2027121 |
Source Port: | 44490 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1514.71.253.2046087675472023548 08/26/23-18:52:18.382254 |
SID: | 2023548 |
Source Port: | 60876 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1586.151.153.714533875472023548 08/26/23-18:52:16.538939 |
SID: | 2023548 |
Source Port: | 45338 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15196.247.229.14251384802835221 08/26/23-18:52:04.250646 |
SID: | 2835221 |
Source Port: | 51384 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15183.106.113.844511475472023548 08/26/23-18:52:18.375668 |
SID: | 2023548 |
Source Port: | 45114 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15208.109.13.17136122802030092 08/26/23-18:52:06.690566 |
SID: | 2030092 |
Source Port: | 36122 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15112.179.51.675613075472023548 08/26/23-18:52:16.711734 |
SID: | 2023548 |
Source Port: | 56130 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15212.25.185.16357518802835221 08/26/23-18:52:21.691263 |
SID: | 2835221 |
Source Port: | 57518 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15212.129.40.215049080802835221 08/26/23-18:52:12.479108 |
SID: | 2835221 |
Source Port: | 50490 |
Destination Port: | 8080 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15200.162.245.553303275472023548 08/26/23-18:52:22.656039 |
SID: | 2023548 |
Source Port: | 33032 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15189.19.114.1715121675472023548 08/26/23-18:52:02.683334 |
SID: | 2023548 |
Source Port: | 51216 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15180.67.123.11247000802030092 08/26/23-18:52:03.460840 |
SID: | 2030092 |
Source Port: | 47000 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.155.105.149.11260058802030092 08/26/23-18:52:02.381496 |
SID: | 2030092 |
Source Port: | 60058 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1520.160.254.11757680802030092 08/26/23-18:52:18.899027 |
SID: | 2030092 |
Source Port: | 57680 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15152.44.51.1365654675472023548 08/26/23-18:52:05.159420 |
SID: | 2023548 |
Source Port: | 56546 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15121.137.118.975373275472023548 08/26/23-18:52:17.371295 |
SID: | 2023548 |
Source Port: | 53732 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1595.129.58.1834602802027121 08/26/23-18:52:06.239062 |
SID: | 2027121 |
Source Port: | 34602 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1552.5.213.15046824802030092 08/26/23-18:52:07.067300 |
SID: | 2030092 |
Source Port: | 46824 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1523.35.5.4350976802030092 08/26/23-18:52:15.254895 |
SID: | 2030092 |
Source Port: | 50976 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1571.1.237.623668275472023548 08/26/23-18:52:05.173094 |
SID: | 2023548 |
Source Port: | 36682 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15220.81.122.1944053675472023548 08/26/23-18:52:21.432180 |
SID: | 2023548 |
Source Port: | 40536 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15175.242.87.2363755475472023548 08/26/23-18:52:22.762550 |
SID: | 2023548 |
Source Port: | 37554 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.152.88.11.1763856475472023548 08/26/23-18:52:02.281900 |
SID: | 2023548 |
Source Port: | 38564 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15137.25.136.1675098875472023548 08/26/23-18:52:20.886785 |
SID: | 2023548 |
Source Port: | 50988 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1584.7.151.4757342802030092 08/26/23-18:52:12.720610 |
SID: | 2030092 |
Source Port: | 57342 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1595.50.129.9845978802027121 08/26/23-18:52:19.937036 |
SID: | 2027121 |
Source Port: | 45978 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.1586.144.55.2245944275472023548 08/26/23-18:52:11.873007 |
SID: | 2023548 |
Source Port: | 59442 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.15188.253.2.22047998802030092 08/26/23-18:52:17.089004 |
SID: | 2030092 |
Source Port: | 47998 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15184.103.165.1216052275472023548 08/26/23-18:52:02.212015 |
SID: | 2023548 |
Source Port: | 60522 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
- • AV Detection
- • Bitcoin Miner
- • Networking
- • System Summary
- • Persistence and Installation Behavior
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Language, Device and Operating System Detection
- • Stealing of Sensitive Information
- • Remote Access Functionality
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Reads CPU info from /sys: | Jump to behavior |
Networking |
---|
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: |
Source: | TCP traffic: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | Socket: | Jump to behavior | ||
Source: | Socket: | Jump to behavior |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |