Linux
Analysis Report
z0r0.i686.elf
Overview
General Information
Detection
Mirai
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Signatures
Yara detected Mirai
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Snort IDS alert for network traffic
Connects to many ports of the same IP (likely port scanning)
Sample is packed with UPX
Uses known network protocols on non-standard ports
Machine Learning detection for sample
Sample tries to kill multiple processes (SIGKILL)
Sample contains only a LOAD segment without any section mappings
Yara signature match
Uses the "uname" system call to query kernel version information (possible evasion)
Enumerates processes within the "proc" file system
Detected TCP or UDP traffic on non-standard ports
Sample tries to kill a process (SIGKILL)
ELF contains segments with high entropy indicating compressed/encrypted content
Creates hidden files and/or directories
HTTP GET or POST without a user agent
Classification
Analysis Advice
Some HTTP requests failed (404). It is likely that the sample will exhibit less behavior. |
Joe Sandbox Version: | 38.0.0 Ammolite |
Analysis ID: | 1333725 |
Start date and time: | 2023-10-28 21:33:17 +02:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 4m 58s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11) |
Analysis Mode: | default |
Sample file name: | z0r0.i686.elf |
Detection: | MAL |
Classification: | mal100.spre.troj.evad.linELF@0/0@0/0 |
- Report size exceeded maximum capacity and may have missing network information.
Command: | /tmp/z0r0.i686.elf |
PID: | 5513 |
Exit Code: | 0 |
Exit Code Info: | |
Killed: | False |
Standard Output: | unstable_is_the_history_of_universe |
Standard Error: |
- system is lnxubuntu20
- z0r0.i686.elf New Fork (PID: 5514, Parent: 5513)
- z0r0.i686.elf New Fork (PID: 5515, Parent: 5514)
- z0r0.i686.elf New Fork (PID: 5516, Parent: 5514)
- z0r0.i686.elf New Fork (PID: 5517, Parent: 5514)
- z0r0.i686.elf New Fork (PID: 5519, Parent: 5514)
- z0r0.i686.elf New Fork (PID: 5520, Parent: 5514)
- xfce4-panel New Fork (PID: 5523, Parent: 3235)
- xfce4-panel New Fork (PID: 5524, Parent: 3235)
- xfce4-panel New Fork (PID: 5525, Parent: 3235)
- xfce4-panel New Fork (PID: 5526, Parent: 3235)
- wrapper-2.0 New Fork (PID: 5547, Parent: 5526)
- xfce4-panel New Fork (PID: 5527, Parent: 3235)
- xfce4-panel New Fork (PID: 5528, Parent: 3235)
- dbus-daemon New Fork (PID: 5546, Parent: 5545)
- systemd New Fork (PID: 5555, Parent: 3044)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Mirai | Mirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world. | No Attribution |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Mirai_6 | Yara detected Mirai | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Mirai_8 | Yara detected Mirai | Joe Security | ||
Linux_Trojan_Mirai_268aac0b | unknown | unknown |
| |
Linux_Trojan_Mirai_0cb1699c | unknown | unknown |
| |
Linux_Trojan_Mirai_c8385b81 | unknown | unknown |
| |
Linux_Trojan_Mirai_70ef58f1 | unknown | unknown |
| |
Click to see the 21 entries |
Timestamp: | 192.168.2.155.57.39.13150946802025883 10/28/23-21:34:51.902179 |
SID: | 2025883 |
Source Port: | 50946 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.152.17.86.20148790802030092 10/28/23-21:35:07.136525 |
SID: | 2030092 |
Source Port: | 48790 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15176.56.184.23737406802030092 10/28/23-21:34:33.757474 |
SID: | 2030092 |
Source Port: | 37406 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15111.234.182.3240126802025883 10/28/23-21:34:45.488425 |
SID: | 2025883 |
Source Port: | 40126 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15220.135.116.2634550802030092 10/28/23-21:34:34.746477 |
SID: | 2030092 |
Source Port: | 34550 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1561.54.86.24137038802025883 10/28/23-21:35:02.334719 |
SID: | 2025883 |
Source Port: | 37038 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15119.160.138.8735522802025883 10/28/23-21:34:45.723813 |
SID: | 2025883 |
Source Port: | 35522 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15111.230.37.13247588802030092 10/28/23-21:34:09.003452 |
SID: | 2030092 |
Source Port: | 47588 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15142.234.171.2344304802025883 10/28/23-21:34:33.748376 |
SID: | 2025883 |
Source Port: | 44304 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1582.62.121.24646358802025883 10/28/23-21:35:02.467617 |
SID: | 2025883 |
Source Port: | 46358 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1554.235.29.24639816802025883 10/28/23-21:34:39.364660 |
SID: | 2025883 |
Source Port: | 39816 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1590.182.112.3150986802030092 10/28/23-21:34:42.274066 |
SID: | 2030092 |
Source Port: | 50986 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15192.81.217.22151354802030092 10/28/23-21:34:41.986035 |
SID: | 2030092 |
Source Port: | 51354 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15184.86.170.19950216802025883 10/28/23-21:34:42.362757 |
SID: | 2025883 |
Source Port: | 50216 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15173.249.18.3849128802025883 10/28/23-21:34:12.218118 |
SID: | 2025883 |
Source Port: | 49128 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15164.115.41.11049234802025883 10/28/23-21:34:29.291589 |
SID: | 2025883 |
Source Port: | 49234 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15221.157.206.12434980802025883 10/28/23-21:34:45.216215 |
SID: | 2025883 |
Source Port: | 34980 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15219.144.99.19360942802030092 10/28/23-21:34:29.254701 |
SID: | 2030092 |
Source Port: | 60942 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15169.150.200.12257062802025883 10/28/23-21:34:33.776059 |
SID: | 2025883 |
Source Port: | 57062 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1523.51.184.11537304802030092 10/28/23-21:35:02.644809 |
SID: | 2030092 |
Source Port: | 37304 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15154.213.229.13751426802025883 10/28/23-21:34:09.308084 |
SID: | 2025883 |
Source Port: | 51426 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1523.38.77.2958372802030092 10/28/23-21:34:13.521374 |
SID: | 2030092 |
Source Port: | 58372 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15104.253.183.17752468802025883 10/28/23-21:34:55.111292 |
SID: | 2025883 |
Source Port: | 52468 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1594.130.200.7836070802025883 10/28/23-21:34:51.455663 |
SID: | 2025883 |
Source Port: | 36070 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1552.198.54.17245984802025883 10/28/23-21:34:12.310826 |
SID: | 2025883 |
Source Port: | 45984 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15154.7.37.5835040802030092 10/28/23-21:34:33.743723 |
SID: | 2030092 |
Source Port: | 35040 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15115.159.63.3139250802025883 10/28/23-21:34:42.530865 |
SID: | 2025883 |
Source Port: | 39250 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1538.11.1.20259316802030092 10/28/23-21:34:33.122269 |
SID: | 2030092 |
Source Port: | 59316 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15162.191.185.18036640802030092 10/28/23-21:34:37.754465 |
SID: | 2030092 |
Source Port: | 36640 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1523.74.17.8036400802030092 10/28/23-21:34:55.717944 |
SID: | 2030092 |
Source Port: | 36400 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15217.67.208.9354208802030092 10/28/23-21:34:29.347543 |
SID: | 2030092 |
Source Port: | 54208 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1540.112.176.14737052802025883 10/28/23-21:34:46.407694 |
SID: | 2025883 |
Source Port: | 37052 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1535.202.64.14356138802025883 10/28/23-21:34:51.394920 |
SID: | 2025883 |
Source Port: | 56138 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1586.143.56.19855090802025883 10/28/23-21:34:13.701542 |
SID: | 2025883 |
Source Port: | 55090 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15104.97.70.18456702802025883 10/28/23-21:34:12.207317 |
SID: | 2025883 |
Source Port: | 56702 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15160.62.4.22340420802030092 10/28/23-21:34:39.550556 |
SID: | 2030092 |
Source Port: | 40420 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15148.212.51.1341088802030092 10/28/23-21:34:29.131268 |
SID: | 2030092 |
Source Port: | 41088 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15169.150.200.12257080802025883 10/28/23-21:34:33.155980 |
SID: | 2025883 |
Source Port: | 57080 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1547.96.195.13354490802030092 10/28/23-21:34:39.475292 |
SID: | 2030092 |
Source Port: | 54490 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1566.227.157.15338634802025883 10/28/23-21:34:09.434972 |
SID: | 2025883 |
Source Port: | 38634 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15211.227.236.5645282802025883 10/28/23-21:34:09.725335 |
SID: | 2025883 |
Source Port: | 45282 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15104.81.7.22547446802025883 10/28/23-21:34:09.634035 |
SID: | 2025883 |
Source Port: | 47446 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15164.115.41.11049212802030092 10/28/23-21:34:12.933084 |
SID: | 2030092 |
Source Port: | 49212 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1569.163.141.11142218802030092 10/28/23-21:34:55.117685 |
SID: | 2030092 |
Source Port: | 42218 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1550.2.64.11032870802025883 10/28/23-21:34:55.382029 |
SID: | 2025883 |
Source Port: | 32870 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1520.28.255.5349434802030092 10/28/23-21:34:45.747624 |
SID: | 2030092 |
Source Port: | 49434 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15185.157.29.6759906802030092 10/28/23-21:34:48.995534 |
SID: | 2030092 |
Source Port: | 59906 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15147.161.130.11037912802030092 10/28/23-21:34:13.699809 |
SID: | 2030092 |
Source Port: | 37912 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1590.182.112.3150986802025883 10/28/23-21:34:42.274066 |
SID: | 2025883 |
Source Port: | 50986 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1562.162.66.22960672802030092 10/28/23-21:34:48.802821 |
SID: | 2030092 |
Source Port: | 60672 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15219.144.99.19360942802025883 10/28/23-21:34:29.254701 |
SID: | 2025883 |
Source Port: | 60942 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1582.62.121.24646358802030092 10/28/23-21:35:02.467617 |
SID: | 2030092 |
Source Port: | 46358 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1547.254.218.14141402802030092 10/28/23-21:34:34.806466 |
SID: | 2030092 |
Source Port: | 41402 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15111.230.37.13247588802025883 10/28/23-21:34:09.003452 |
SID: | 2025883 |
Source Port: | 47588 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15173.249.18.3849128802030092 10/28/23-21:34:12.218118 |
SID: | 2030092 |
Source Port: | 49128 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15104.81.7.22547446802030092 10/28/23-21:34:09.634035 |
SID: | 2030092 |
Source Port: | 47446 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15219.144.99.19360940802030092 10/28/23-21:34:29.254444 |
SID: | 2030092 |
Source Port: | 60940 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1595.216.184.2035690802025883 10/28/23-21:34:33.974947 |
SID: | 2025883 |
Source Port: | 35690 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15184.86.170.19950216802030092 10/28/23-21:34:42.362757 |
SID: | 2030092 |
Source Port: | 50216 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1523.33.160.13137466802030092 10/28/23-21:34:59.424876 |
SID: | 2030092 |
Source Port: | 37466 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1578.108.86.18549062802025883 10/28/23-21:34:39.399134 |
SID: | 2025883 |
Source Port: | 49062 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15119.160.138.8735522802030092 10/28/23-21:34:45.723813 |
SID: | 2030092 |
Source Port: | 35522 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1592.65.135.3159990802030092 10/28/23-21:34:12.227129 |
SID: | 2030092 |
Source Port: | 59990 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15104.253.183.17752468802030092 10/28/23-21:34:55.111292 |
SID: | 2030092 |
Source Port: | 52468 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1582.202.230.11751668802025883 10/28/23-21:34:39.388994 |
SID: | 2025883 |
Source Port: | 51668 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15144.190.64.7447784802030092 10/28/23-21:34:55.131982 |
SID: | 2030092 |
Source Port: | 47784 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15178.132.105.24155036802030092 10/28/23-21:34:30.349130 |
SID: | 2030092 |
Source Port: | 55036 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1534.251.253.24934034802025883 10/28/23-21:34:30.349064 |
SID: | 2025883 |
Source Port: | 34034 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15119.96.160.1945168802030092 10/28/23-21:34:58.832126 |
SID: | 2030092 |
Source Port: | 45168 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15221.157.206.12434980802030092 10/28/23-21:34:45.216215 |
SID: | 2030092 |
Source Port: | 34980 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15106.15.147.17946752802030092 10/28/23-21:34:58.337544 |
SID: | 2030092 |
Source Port: | 46752 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.155.251.114.19756898802025883 10/28/23-21:34:51.826514 |
SID: | 2025883 |
Source Port: | 56898 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15162.191.185.18036640802025883 10/28/23-21:34:37.754465 |
SID: | 2025883 |
Source Port: | 36640 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1527.2.212.17345776802025883 10/28/23-21:34:39.522576 |
SID: | 2025883 |
Source Port: | 45776 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15192.81.217.22151354802025883 10/28/23-21:34:41.986035 |
SID: | 2025883 |
Source Port: | 51354 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1523.214.162.21748974802025883 10/28/23-21:34:08.907011 |
SID: | 2025883 |
Source Port: | 48974 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1582.202.230.11751668802030092 10/28/23-21:34:39.388994 |
SID: | 2030092 |
Source Port: | 51668 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1518.165.27.8935732802025883 10/28/23-21:34:46.343538 |
SID: | 2025883 |
Source Port: | 35732 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15169.150.200.12257080802030092 10/28/23-21:34:33.155980 |
SID: | 2030092 |
Source Port: | 57080 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1546.141.119.10759844802025883 10/28/23-21:34:09.641515 |
SID: | 2025883 |
Source Port: | 59844 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1540.112.176.14737052802030092 10/28/23-21:34:46.407694 |
SID: | 2030092 |
Source Port: | 37052 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1595.181.198.11343722802030092 10/28/23-21:35:02.494407 |
SID: | 2030092 |
Source Port: | 43722 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1547.254.218.14141402802025883 10/28/23-21:34:34.806466 |
SID: | 2025883 |
Source Port: | 41402 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1585.114.86.557830802030092 10/28/23-21:34:36.483249 |
SID: | 2030092 |
Source Port: | 57830 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15104.91.245.14052078802025883 10/28/23-21:34:34.790566 |
SID: | 2025883 |
Source Port: | 52078 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15174.137.218.21034838802030092 10/28/23-21:34:45.444464 |
SID: | 2030092 |
Source Port: | 34838 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15211.227.236.5645282802030092 10/28/23-21:34:09.725335 |
SID: | 2030092 |
Source Port: | 45282 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15103.30.212.3157210802025883 10/28/23-21:34:52.026909 |
SID: | 2025883 |
Source Port: | 57210 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15154.213.229.13751426802030092 10/28/23-21:34:09.308084 |
SID: | 2030092 |
Source Port: | 51426 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1538.11.1.20259316802025883 10/28/23-21:34:33.122269 |
SID: | 2025883 |
Source Port: | 59316 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1545.39.12.8253502802025883 10/28/23-21:34:42.636627 |
SID: | 2025883 |
Source Port: | 53502 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1552.198.54.17245984802030092 10/28/23-21:34:12.310826 |
SID: | 2030092 |
Source Port: | 45984 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15107.172.43.8841120802030092 10/28/23-21:34:39.279634 |
SID: | 2030092 |
Source Port: | 41120 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1578.108.86.18549062802030092 10/28/23-21:34:39.399134 |
SID: | 2030092 |
Source Port: | 49062 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1535.202.64.14356138802030092 10/28/23-21:34:51.394920 |
SID: | 2030092 |
Source Port: | 56138 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15110.232.123.12949462802030092 10/28/23-21:34:55.727213 |
SID: | 2030092 |
Source Port: | 49462 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1523.44.141.9355696802030092 10/28/23-21:34:36.784497 |
SID: | 2030092 |
Source Port: | 55696 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15202.120.6.16855560802025883 10/28/23-21:34:45.626032 |
SID: | 2025883 |
Source Port: | 55560 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15119.96.160.1945162802025883 10/28/23-21:34:58.691179 |
SID: | 2025883 |
Source Port: | 45162 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1523.33.160.13137466802025883 10/28/23-21:34:59.424876 |
SID: | 2025883 |
Source Port: | 37466 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15148.251.16.5439998802030092 10/28/23-21:34:39.550923 |
SID: | 2030092 |
Source Port: | 39998 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1568.183.242.11947100802025883 10/28/23-21:34:48.995698 |
SID: | 2025883 |
Source Port: | 47100 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1523.214.162.21748974802030092 10/28/23-21:34:08.907011 |
SID: | 2030092 |
Source Port: | 48974 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1527.2.212.17345776802030092 10/28/23-21:34:39.522576 |
SID: | 2030092 |
Source Port: | 45776 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15103.42.61.23537990802030092 10/28/23-21:34:42.529160 |
SID: | 2030092 |
Source Port: | 37990 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1518.161.114.16652774802025883 10/28/23-21:34:58.200116 |
SID: | 2025883 |
Source Port: | 52774 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15106.15.147.17946752802025883 10/28/23-21:34:58.337544 |
SID: | 2025883 |
Source Port: | 46752 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1534.251.253.24934034802030092 10/28/23-21:34:30.349064 |
SID: | 2030092 |
Source Port: | 34034 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15218.161.95.22353070802030092 10/28/23-21:34:42.532382 |
SID: | 2030092 |
Source Port: | 53070 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1535.190.94.7152428802025883 10/28/23-21:34:58.418320 |
SID: | 2025883 |
Source Port: | 52428 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15166.251.91.22753140802030092 10/28/23-21:34:12.252997 |
SID: | 2030092 |
Source Port: | 53140 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1592.65.135.3159990802025883 10/28/23-21:34:12.227129 |
SID: | 2025883 |
Source Port: | 59990 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1523.10.62.23349212802030092 10/28/23-21:34:34.510843 |
SID: | 2030092 |
Source Port: | 49212 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15209.198.36.13446202802025883 10/28/23-21:34:29.576092 |
SID: | 2025883 |
Source Port: | 46202 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1546.141.119.10759844802030092 10/28/23-21:34:09.641515 |
SID: | 2030092 |
Source Port: | 59844 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15103.30.212.3157210802030092 10/28/23-21:34:52.026909 |
SID: | 2030092 |
Source Port: | 57210 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15124.223.108.12238424802025883 10/28/23-21:35:02.284121 |
SID: | 2025883 |
Source Port: | 38424 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1582.156.146.22958598802025883 10/28/23-21:34:36.789045 |
SID: | 2025883 |
Source Port: | 58598 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15122.114.60.8959830802025883 10/28/23-21:34:42.237226 |
SID: | 2025883 |
Source Port: | 59830 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15103.100.6.2647932802030092 10/28/23-21:34:37.192769 |
SID: | 2030092 |
Source Port: | 47932 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1513.35.177.21257008802030092 10/28/23-21:34:39.451736 |
SID: | 2030092 |
Source Port: | 57008 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1585.114.86.557830802025883 10/28/23-21:34:36.483249 |
SID: | 2025883 |
Source Port: | 57830 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15204.83.66.16540904802030092 10/28/23-21:34:58.169640 |
SID: | 2030092 |
Source Port: | 40904 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1531.15.12.12448252802025883 10/28/23-21:34:33.155004 |
SID: | 2025883 |
Source Port: | 48252 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1513.215.0.23041964802030092 10/28/23-21:35:02.644299 |
SID: | 2030092 |
Source Port: | 41964 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15108.157.234.19059438802030092 10/28/23-21:34:12.625672 |
SID: | 2030092 |
Source Port: | 59438 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1523.212.29.22035546802025883 10/28/23-21:35:02.170425 |
SID: | 2025883 |
Source Port: | 35546 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15154.213.241.4138336802025883 10/28/23-21:35:02.595461 |
SID: | 2025883 |
Source Port: | 38336 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1568.183.242.11947100802030092 10/28/23-21:34:48.995698 |
SID: | 2030092 |
Source Port: | 47100 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1523.64.59.7533468802030092 10/28/23-21:34:49.903061 |
SID: | 2030092 |
Source Port: | 33468 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1595.181.198.11343722802025883 10/28/23-21:35:02.494407 |
SID: | 2025883 |
Source Port: | 43722 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15159.223.115.2337492802025883 10/28/23-21:34:39.270326 |
SID: | 2025883 |
Source Port: | 37492 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1531.15.12.12448252802030092 10/28/23-21:34:33.155004 |
SID: | 2030092 |
Source Port: | 48252 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15220.135.116.2634550802025883 10/28/23-21:34:34.746477 |
SID: | 2025883 |
Source Port: | 34550 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15147.46.88.23936608802030092 10/28/23-21:34:29.537969 |
SID: | 2030092 |
Source Port: | 36608 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1523.38.77.2958372802025883 10/28/23-21:34:13.521374 |
SID: | 2025883 |
Source Port: | 58372 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1531.15.12.12448230802025883 10/28/23-21:34:33.775777 |
SID: | 2025883 |
Source Port: | 48230 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15148.251.16.5439998802025883 10/28/23-21:34:39.550923 |
SID: | 2025883 |
Source Port: | 39998 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15148.212.51.1341088802025883 10/28/23-21:34:29.131268 |
SID: | 2025883 |
Source Port: | 41088 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15218.161.95.22353070802025883 10/28/23-21:34:42.532382 |
SID: | 2025883 |
Source Port: | 53070 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1518.161.114.16652774802030092 10/28/23-21:34:58.200116 |
SID: | 2030092 |
Source Port: | 52774 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1518.164.177.10841116802030092 10/28/23-21:35:02.316415 |
SID: | 2030092 |
Source Port: | 41116 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1545.43.204.1742526802030092 10/28/23-21:34:58.354742 |
SID: | 2030092 |
Source Port: | 42526 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1582.156.146.22958598802030092 10/28/23-21:34:36.789045 |
SID: | 2030092 |
Source Port: | 58598 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1523.214.29.7152260802025883 10/28/23-21:35:02.472001 |
SID: | 2025883 |
Source Port: | 52260 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15209.198.36.13446202802030092 10/28/23-21:34:29.576092 |
SID: | 2030092 |
Source Port: | 46202 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15154.26.133.22450092802025883 10/28/23-21:34:45.868823 |
SID: | 2025883 |
Source Port: | 50092 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1564.72.202.13842092802025883 10/28/23-21:34:51.730115 |
SID: | 2025883 |
Source Port: | 42092 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1531.15.12.12448230802030092 10/28/23-21:34:33.775777 |
SID: | 2030092 |
Source Port: | 48230 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1564.72.202.13842092802030092 10/28/23-21:34:51.730115 |
SID: | 2030092 |
Source Port: | 42092 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1545.63.99.15536236802030092 10/28/23-21:34:34.457863 |
SID: | 2030092 |
Source Port: | 36236 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15103.100.6.2647932802025883 10/28/23-21:34:37.192769 |
SID: | 2025883 |
Source Port: | 47932 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1513.215.0.23041964802025883 10/28/23-21:35:02.644299 |
SID: | 2025883 |
Source Port: | 41964 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1545.43.204.1742526802025883 10/28/23-21:34:58.354742 |
SID: | 2025883 |
Source Port: | 42526 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15119.96.160.1945172802025883 10/28/23-21:34:58.983099 |
SID: | 2025883 |
Source Port: | 45172 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15169.150.200.12257062802030092 10/28/23-21:34:33.776059 |
SID: | 2030092 |
Source Port: | 57062 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15198.160.110.8957784802030092 10/28/23-21:34:51.522146 |
SID: | 2030092 |
Source Port: | 57784 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1523.51.184.11537304802025883 10/28/23-21:35:02.644809 |
SID: | 2025883 |
Source Port: | 37304 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15103.180.175.9745586802025883 10/28/23-21:34:33.815262 |
SID: | 2025883 |
Source Port: | 45586 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1520.39.137.23446000802030092 10/28/23-21:34:33.075184 |
SID: | 2030092 |
Source Port: | 46000 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1562.162.66.22960672802025883 10/28/23-21:34:48.802821 |
SID: | 2025883 |
Source Port: | 60672 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1523.64.59.7533468802025883 10/28/23-21:34:49.903061 |
SID: | 2025883 |
Source Port: | 33468 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15159.223.115.2337492802030092 10/28/23-21:34:39.270326 |
SID: | 2030092 |
Source Port: | 37492 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1513.35.177.21257008802025883 10/28/23-21:34:39.451736 |
SID: | 2025883 |
Source Port: | 57008 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15103.180.175.9745586802030092 10/28/23-21:34:33.815262 |
SID: | 2030092 |
Source Port: | 45586 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15154.26.133.22450092802030092 10/28/23-21:34:45.868823 |
SID: | 2030092 |
Source Port: | 50092 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1534.139.147.24642014802030092 10/28/23-21:35:02.123982 |
SID: | 2030092 |
Source Port: | 42014 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15108.158.236.17835268802030092 10/28/23-21:34:32.961295 |
SID: | 2030092 |
Source Port: | 35268 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15124.223.108.12238424802030092 10/28/23-21:35:02.284121 |
SID: | 2030092 |
Source Port: | 38424 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15180.81.171.12560328802025883 10/28/23-21:34:08.999463 |
SID: | 2025883 |
Source Port: | 60328 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1574.208.112.4851524802025883 10/28/23-21:34:37.717106 |
SID: | 2025883 |
Source Port: | 51524 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1591.184.60.14636174802025883 10/28/23-21:34:45.110197 |
SID: | 2025883 |
Source Port: | 36174 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1523.10.62.23349212802025883 10/28/23-21:34:34.510843 |
SID: | 2025883 |
Source Port: | 49212 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15220.149.114.18260966802025883 10/28/23-21:34:51.554876 |
SID: | 2025883 |
Source Port: | 60966 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1523.214.158.354112802025883 10/28/23-21:34:48.974947 |
SID: | 2025883 |
Source Port: | 54112 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15119.96.160.1945172802030092 10/28/23-21:34:58.983099 |
SID: | 2030092 |
Source Port: | 45172 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1518.164.177.10841116802025883 10/28/23-21:35:02.316415 |
SID: | 2025883 |
Source Port: | 41116 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15147.46.88.23936608802025883 10/28/23-21:34:29.537969 |
SID: | 2025883 |
Source Port: | 36608 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1552.68.16.16060612802030092 10/28/23-21:34:33.650120 |
SID: | 2030092 |
Source Port: | 60612 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15178.57.222.17443138802025883 10/28/23-21:34:45.362390 |
SID: | 2025883 |
Source Port: | 43138 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15115.147.55.21037964802030092 10/28/23-21:34:49.302835 |
SID: | 2030092 |
Source Port: | 37964 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15206.189.175.5235274802025883 10/28/23-21:34:45.460029 |
SID: | 2025883 |
Source Port: | 35274 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1593.56.105.16950232802025883 10/28/23-21:34:33.182788 |
SID: | 2025883 |
Source Port: | 50232 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1554.156.191.22956610802030092 10/28/23-21:34:12.470818 |
SID: | 2030092 |
Source Port: | 56610 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1520.39.137.23446000802025883 10/28/23-21:34:33.075184 |
SID: | 2025883 |
Source Port: | 46000 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1523.214.29.7152260802030092 10/28/23-21:35:02.472001 |
SID: | 2030092 |
Source Port: | 52260 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1570.72.214.16744446802030092 10/28/23-21:34:55.434622 |
SID: | 2030092 |
Source Port: | 44446 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1559.184.141.12345506802030092 10/28/23-21:34:33.882996 |
SID: | 2030092 |
Source Port: | 45506 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1518.196.166.16149502802030092 10/28/23-21:34:42.072180 |
SID: | 2030092 |
Source Port: | 49502 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15125.229.199.642620802025883 10/28/23-21:34:49.862163 |
SID: | 2025883 |
Source Port: | 42620 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1545.63.99.15536236802025883 10/28/23-21:34:34.457863 |
SID: | 2025883 |
Source Port: | 36236 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15119.96.160.1945162802030092 10/28/23-21:34:58.691179 |
SID: | 2030092 |
Source Port: | 45162 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1523.44.141.9355696802025883 10/28/23-21:34:36.784497 |
SID: | 2025883 |
Source Port: | 55696 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1523.32.213.22960194802030092 10/28/23-21:34:58.509153 |
SID: | 2030092 |
Source Port: | 60194 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15103.85.221.6752976802030092 10/28/23-21:34:51.623652 |
SID: | 2030092 |
Source Port: | 52976 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1576.82.173.12253998802025883 10/28/23-21:34:45.295175 |
SID: | 2025883 |
Source Port: | 53998 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15185.225.13.1347826802025883 10/28/23-21:34:42.232458 |
SID: | 2025883 |
Source Port: | 47826 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1523.210.100.23545030802025883 10/28/23-21:34:12.376544 |
SID: | 2025883 |
Source Port: | 45030 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15104.82.212.4856660802030092 10/28/23-21:34:55.460445 |
SID: | 2030092 |
Source Port: | 56660 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15103.252.212.8545208802030092 10/28/23-21:34:49.268844 |
SID: | 2030092 |
Source Port: | 45208 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1545.39.12.8253502802030092 10/28/23-21:34:42.636627 |
SID: | 2030092 |
Source Port: | 53502 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15220.149.114.18260966802030092 10/28/23-21:34:51.554876 |
SID: | 2030092 |
Source Port: | 60966 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15206.189.175.5235274802030092 10/28/23-21:34:45.460029 |
SID: | 2030092 |
Source Port: | 35274 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1599.192.204.18452620802025883 10/28/23-21:34:09.834864 |
SID: | 2025883 |
Source Port: | 52620 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15204.83.66.16540904802025883 10/28/23-21:34:58.169640 |
SID: | 2025883 |
Source Port: | 40904 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1576.82.173.12253998802030092 10/28/23-21:34:45.295175 |
SID: | 2030092 |
Source Port: | 53998 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15198.244.143.6355088802025883 10/28/23-21:34:33.750076 |
SID: | 2025883 |
Source Port: | 55088 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1535.190.94.7152428802030092 10/28/23-21:34:58.418320 |
SID: | 2030092 |
Source Port: | 52428 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1554.156.191.22956610802025883 10/28/23-21:34:12.470818 |
SID: | 2025883 |
Source Port: | 56610 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15202.120.6.16855560802030092 10/28/23-21:34:45.626032 |
SID: | 2030092 |
Source Port: | 55560 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1574.208.112.4851524802030092 10/28/23-21:34:37.717106 |
SID: | 2030092 |
Source Port: | 51524 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15104.91.245.14052078802030092 10/28/23-21:34:34.790566 |
SID: | 2030092 |
Source Port: | 52078 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1523.47.82.11160468802025883 10/28/23-21:34:59.694337 |
SID: | 2025883 |
Source Port: | 60468 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1552.68.16.16060612802025883 10/28/23-21:34:33.650120 |
SID: | 2025883 |
Source Port: | 60612 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1559.184.141.12345506802025883 10/28/23-21:34:33.882996 |
SID: | 2025883 |
Source Port: | 45506 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15217.67.208.9354232802025883 10/28/23-21:34:29.739114 |
SID: | 2025883 |
Source Port: | 54232 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1578.24.108.5157300802025883 10/28/23-21:34:36.372048 |
SID: | 2025883 |
Source Port: | 57300 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1534.139.147.24642014802025883 10/28/23-21:35:02.123982 |
SID: | 2025883 |
Source Port: | 42014 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.155.251.114.19756898802030092 10/28/23-21:34:51.826514 |
SID: | 2030092 |
Source Port: | 56898 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15115.147.55.21037964802025883 10/28/23-21:34:49.302835 |
SID: | 2025883 |
Source Port: | 37964 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15125.229.199.642620802030092 10/28/23-21:34:49.862163 |
SID: | 2030092 |
Source Port: | 42620 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1581.19.203.7341956802025883 10/28/23-21:34:12.585246 |
SID: | 2025883 |
Source Port: | 41956 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15117.20.108.655136802025883 10/28/23-21:34:29.517095 |
SID: | 2025883 |
Source Port: | 55136 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1539.118.74.1244298802030092 10/28/23-21:34:33.877868 |
SID: | 2030092 |
Source Port: | 44298 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15178.57.222.17443138802030092 10/28/23-21:34:45.362390 |
SID: | 2030092 |
Source Port: | 43138 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15154.213.241.4138336802030092 10/28/23-21:35:02.595461 |
SID: | 2030092 |
Source Port: | 38336 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1523.212.29.22035546802030092 10/28/23-21:35:02.170425 |
SID: | 2030092 |
Source Port: | 35546 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15108.158.236.17835268802025883 10/28/23-21:34:32.961295 |
SID: | 2025883 |
Source Port: | 35268 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1593.56.105.16950232802030092 10/28/23-21:34:33.182788 |
SID: | 2030092 |
Source Port: | 50232 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15178.214.85.1960142802030092 10/28/23-21:34:42.111559 |
SID: | 2030092 |
Source Port: | 60142 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15122.114.60.8959830802030092 10/28/23-21:34:42.237226 |
SID: | 2030092 |
Source Port: | 59830 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15180.81.171.12560328802030092 10/28/23-21:34:08.999463 |
SID: | 2030092 |
Source Port: | 60328 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15219.144.99.19360940802025883 10/28/23-21:34:29.254444 |
SID: | 2025883 |
Source Port: | 60940 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1595.216.184.2035690802030092 10/28/23-21:34:33.974947 |
SID: | 2030092 |
Source Port: | 35690 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15143.178.249.21548434802030092 10/28/23-21:34:48.995510 |
SID: | 2030092 |
Source Port: | 48434 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15108.157.234.19059438802025883 10/28/23-21:34:12.625672 |
SID: | 2025883 |
Source Port: | 59438 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1595.216.184.2035654802030092 10/28/23-21:34:33.181601 |
SID: | 2030092 |
Source Port: | 35654 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1523.210.100.23545030802030092 10/28/23-21:34:12.376544 |
SID: | 2030092 |
Source Port: | 45030 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15174.84.163.18954966802025883 10/28/23-21:35:02.255977 |
SID: | 2025883 |
Source Port: | 54966 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15198.244.143.6355088802030092 10/28/23-21:34:33.750076 |
SID: | 2030092 |
Source Port: | 55088 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1578.24.108.5157300802030092 10/28/23-21:34:36.372048 |
SID: | 2030092 |
Source Port: | 57300 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1520.28.255.5349434802025883 10/28/23-21:34:45.747624 |
SID: | 2025883 |
Source Port: | 49434 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15104.97.70.18456702802030092 10/28/23-21:34:12.207317 |
SID: | 2030092 |
Source Port: | 56702 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1552.62.27.20346654802030092 10/28/23-21:34:39.476139 |
SID: | 2030092 |
Source Port: | 46654 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1539.97.162.19542234802030092 10/28/23-21:34:39.476412 |
SID: | 2030092 |
Source Port: | 42234 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15178.132.105.24155036802025883 10/28/23-21:34:30.349130 |
SID: | 2025883 |
Source Port: | 55036 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15189.124.66.22357746802025883 10/28/23-21:34:51.736800 |
SID: | 2025883 |
Source Port: | 57746 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15118.148.55.13653760802030092 10/28/23-21:34:37.877886 |
SID: | 2030092 |
Source Port: | 53760 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15115.159.63.3139250802030092 10/28/23-21:34:42.530865 |
SID: | 2030092 |
Source Port: | 39250 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15143.204.107.1144134802030092 10/28/23-21:34:52.662469 |
SID: | 2030092 |
Source Port: | 44134 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15192.16.97.10246916802030092 10/28/23-21:34:29.432218 |
SID: | 2030092 |
Source Port: | 46916 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1523.47.82.11160468802030092 10/28/23-21:34:59.694337 |
SID: | 2030092 |
Source Port: | 60468 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1581.19.203.7341956802030092 10/28/23-21:34:12.585246 |
SID: | 2030092 |
Source Port: | 41956 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15167.71.86.2342044802025883 10/28/23-21:34:45.037188 |
SID: | 2025883 |
Source Port: | 42044 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1518.196.166.16149502802025883 10/28/23-21:34:42.072180 |
SID: | 2025883 |
Source Port: | 49502 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15192.9.230.9037746802030092 10/28/23-21:34:39.529659 |
SID: | 2030092 |
Source Port: | 37746 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1595.101.251.21736582802025883 10/28/23-21:35:02.156376 |
SID: | 2025883 |
Source Port: | 36582 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15217.67.208.9354232802030092 10/28/23-21:34:29.739114 |
SID: | 2030092 |
Source Port: | 54232 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15160.62.4.22340420802025883 10/28/23-21:34:39.550556 |
SID: | 2025883 |
Source Port: | 40420 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1599.192.204.18452620802030092 10/28/23-21:34:09.834864 |
SID: | 2030092 |
Source Port: | 52620 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15164.115.41.11049234802030092 10/28/23-21:34:29.291589 |
SID: | 2030092 |
Source Port: | 49234 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15119.96.160.1945168802025883 10/28/23-21:34:58.832126 |
SID: | 2025883 |
Source Port: | 45168 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15154.7.37.5835040802025883 10/28/23-21:34:33.743723 |
SID: | 2025883 |
Source Port: | 35040 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1591.184.60.14636174802030092 10/28/23-21:34:45.110197 |
SID: | 2030092 |
Source Port: | 36174 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1523.45.127.17658022802025883 10/28/23-21:34:45.243493 |
SID: | 2025883 |
Source Port: | 58022 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15194.110.78.4560742802030092 10/28/23-21:35:07.203103 |
SID: | 2030092 |
Source Port: | 60742 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15142.234.171.2344304802030092 10/28/23-21:34:33.748376 |
SID: | 2030092 |
Source Port: | 44304 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15210.28.169.13655770802030092 10/28/23-21:34:33.938729 |
SID: | 2030092 |
Source Port: | 55770 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1552.9.110.5044486802025883 10/28/23-21:34:51.434777 |
SID: | 2025883 |
Source Port: | 44486 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15178.214.85.1960142802025883 10/28/23-21:34:42.111559 |
SID: | 2025883 |
Source Port: | 60142 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1539.118.74.1244298802025883 10/28/23-21:34:33.877868 |
SID: | 2025883 |
Source Port: | 44298 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.155.57.39.13150946802030092 10/28/23-21:34:51.902179 |
SID: | 2030092 |
Source Port: | 50946 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1518.165.27.8935732802030092 10/28/23-21:34:46.343538 |
SID: | 2030092 |
Source Port: | 35732 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15174.84.163.18954966802030092 10/28/23-21:35:02.255977 |
SID: | 2030092 |
Source Port: | 54966 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1523.44.141.9355528802030092 10/28/23-21:34:29.142153 |
SID: | 2030092 |
Source Port: | 55528 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1595.216.184.2035654802025883 10/28/23-21:34:33.181601 |
SID: | 2025883 |
Source Port: | 35654 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15176.9.97.16553426802030092 10/28/23-21:34:45.549398 |
SID: | 2030092 |
Source Port: | 53426 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15176.56.184.23737406802025883 10/28/23-21:34:33.757474 |
SID: | 2025883 |
Source Port: | 37406 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15143.178.249.21548434802025883 10/28/23-21:34:48.995510 |
SID: | 2025883 |
Source Port: | 48434 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15117.20.108.655136802030092 10/28/23-21:34:29.517095 |
SID: | 2030092 |
Source Port: | 55136 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1554.235.29.24639816802030092 10/28/23-21:34:39.364660 |
SID: | 2030092 |
Source Port: | 39816 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15107.172.43.8841120802025883 10/28/23-21:34:39.279634 |
SID: | 2025883 |
Source Port: | 41120 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15107.163.85.2533280802030092 10/28/23-21:35:07.164012 |
SID: | 2030092 |
Source Port: | 33280 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15189.124.66.22357746802030092 10/28/23-21:34:51.736800 |
SID: | 2030092 |
Source Port: | 57746 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15174.137.218.21034838802025883 10/28/23-21:34:45.444464 |
SID: | 2025883 |
Source Port: | 34838 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1539.97.162.19542234802025883 10/28/23-21:34:39.476412 |
SID: | 2025883 |
Source Port: | 42234 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1523.44.141.9355528802025883 10/28/23-21:34:29.142153 |
SID: | 2025883 |
Source Port: | 55528 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1570.72.214.16744446802025883 10/28/23-21:34:55.434622 |
SID: | 2025883 |
Source Port: | 44446 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1523.214.158.354112802030092 10/28/23-21:34:48.974947 |
SID: | 2030092 |
Source Port: | 54112 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15154.205.98.10244442802025883 10/28/23-21:34:42.237743 |
SID: | 2025883 |
Source Port: | 44442 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1523.74.17.8036400802025883 10/28/23-21:34:55.717944 |
SID: | 2025883 |
Source Port: | 36400 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15217.67.208.9354208802025883 10/28/23-21:34:29.347543 |
SID: | 2025883 |
Source Port: | 54208 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15154.205.98.10244442802030092 10/28/23-21:34:42.237743 |
SID: | 2030092 |
Source Port: | 44442 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15192.9.230.9037746802025883 10/28/23-21:34:39.529659 |
SID: | 2025883 |
Source Port: | 37746 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1595.101.251.21736582802030092 10/28/23-21:35:02.156376 |
SID: | 2030092 |
Source Port: | 36582 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15167.71.86.2342044802030092 10/28/23-21:34:45.037188 |
SID: | 2030092 |
Source Port: | 42044 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1566.227.157.15338634802030092 10/28/23-21:34:09.434972 |
SID: | 2030092 |
Source Port: | 38634 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15143.204.107.1144134802025883 10/28/23-21:34:52.662469 |
SID: | 2025883 |
Source Port: | 44134 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1552.62.27.20346654802025883 10/28/23-21:34:39.476139 |
SID: | 2025883 |
Source Port: | 46654 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15185.225.13.1347826802030092 10/28/23-21:34:42.232458 |
SID: | 2030092 |
Source Port: | 47826 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1523.32.213.22960194802025883 10/28/23-21:34:58.509153 |
SID: | 2025883 |
Source Port: | 60194 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1569.163.141.11142218802025883 10/28/23-21:34:55.117685 |
SID: | 2025883 |
Source Port: | 42218 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1561.54.86.24137038802030092 10/28/23-21:35:02.334719 |
SID: | 2030092 |
Source Port: | 37038 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1523.45.127.17658022802030092 10/28/23-21:34:45.243493 |
SID: | 2030092 |
Source Port: | 58022 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1594.130.200.7836070802030092 10/28/23-21:34:51.455663 |
SID: | 2030092 |
Source Port: | 36070 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15104.82.212.4856660802025883 10/28/23-21:34:55.460445 |
SID: | 2025883 |
Source Port: | 56660 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15103.252.212.8545208802025883 10/28/23-21:34:49.268844 |
SID: | 2025883 |
Source Port: | 45208 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1547.96.195.13354490802025883 10/28/23-21:34:39.475292 |
SID: | 2025883 |
Source Port: | 54490 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1550.2.64.11032870802030092 10/28/23-21:34:55.382029 |
SID: | 2030092 |
Source Port: | 32870 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.1586.143.56.19855090802030092 10/28/23-21:34:13.701542 |
SID: | 2030092 |
Source Port: | 55090 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15176.9.97.16553426802025883 10/28/23-21:34:45.549398 |
SID: | 2025883 |
Source Port: | 53426 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.15206.237.151.19745382802030092 10/28/23-21:35:07.170772 |
SID: | 2030092 |
Source Port: | 45382 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15210.28.169.13655770802025883 10/28/23-21:34:33.938729 |
SID: | 2025883 |
Source Port: | 55770 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.1552.9.110.5044486802030092 10/28/23-21:34:51.434777 |
SID: | 2030092 |
Source Port: | 44486 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15111.234.182.3240126802030092 10/28/23-21:34:45.488425 |
SID: | 2030092 |
Source Port: | 40126 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.15164.115.41.11049212802025883 10/28/23-21:34:12.933084 |
SID: | 2025883 |
Source Port: | 49212 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
- • AV Detection
- • Networking
- • System Summary
- • Data Obfuscation
- • Persistence and Installation Behavior
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Stealing of Sensitive Information
- • Remote Access Functionality
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Joe Sandbox ML: |
Networking |
---|
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: |
Source: | TCP traffic: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: | ||
Source: | HTTP traffic detected: |