Linux
Analysis Report
db0fa4b8db0333367e9bda3ab68b8042.arm.elf
Overview
General Information
Detection
Mirai
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Signatures
Antivirus / Scanner detection for submitted sample
Yara detected Mirai
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Snort IDS alert for network traffic
Connects to many ports of the same IP (likely port scanning)
Uses known network protocols on non-standard ports
Sample tries to kill multiple processes (SIGKILL)
Yara signature match
Uses the "uname" system call to query kernel version information (possible evasion)
Enumerates processes within the "proc" file system
Detected TCP or UDP traffic on non-standard ports
Sample tries to kill a process (SIGKILL)
Creates hidden files and/or directories
Sample has stripped symbol table
HTTP GET or POST without a user agent
Found strings indicative of a multi-platform dropper
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Classification
Analysis Advice
Some HTTP requests failed (404). It is likely that the sample will exhibit less behavior. |
Static ELF header machine description suggests that the sample might not execute correctly on this machine. |
Static ELF header machine description suggests that the sample might only run correctly on MIPS or ARM architectures. |
Joe Sandbox Version: | 38.0.0 Ammolite |
Analysis ID: | 1335495 |
Start date and time: | 2023-11-01 15:42:10 +01:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 5m 18s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11) |
Analysis Mode: | default |
Sample file name: | db0fa4b8db0333367e9bda3ab68b8042.arm.elf |
Detection: | MAL |
Classification: | mal100.spre.troj.linELF@0/0@2/0 |
- Report size exceeded maximum capacity and may have missing network information.
Command: | /tmp/db0fa4b8db0333367e9bda3ab68b8042.arm.elf |
PID: | 6208 |
Exit Code: | 0 |
Exit Code Info: | |
Killed: | False |
Standard Output: | NukeBotC2_Botnet_Telegram_@DocX69 |
Standard Error: |
- system is lnxubuntu20
- db0fa4b8db0333367e9bda3ab68b8042.arm.elf New Fork (PID: 6210, Parent: 6208)
- db0fa4b8db0333367e9bda3ab68b8042.arm.elf New Fork (PID: 6212, Parent: 6210)
- db0fa4b8db0333367e9bda3ab68b8042.arm.elf New Fork (PID: 6213, Parent: 6210)
- db0fa4b8db0333367e9bda3ab68b8042.arm.elf New Fork (PID: 6214, Parent: 6210)
- db0fa4b8db0333367e9bda3ab68b8042.arm.elf New Fork (PID: 6215, Parent: 6210)
- db0fa4b8db0333367e9bda3ab68b8042.arm.elf New Fork (PID: 6220, Parent: 6210)
- db0fa4b8db0333367e9bda3ab68b8042.arm.elf New Fork (PID: 6221, Parent: 6210)
- db0fa4b8db0333367e9bda3ab68b8042.arm.elf New Fork (PID: 6222, Parent: 6210)
- db0fa4b8db0333367e9bda3ab68b8042.arm.elf New Fork (PID: 6223, Parent: 6210)
- db0fa4b8db0333367e9bda3ab68b8042.arm.elf New Fork (PID: 6224, Parent: 6210)
- db0fa4b8db0333367e9bda3ab68b8042.arm.elf New Fork (PID: 6230, Parent: 6210)
- db0fa4b8db0333367e9bda3ab68b8042.arm.elf New Fork (PID: 6231, Parent: 6210)
- xfce4-panel New Fork (PID: 6240, Parent: 2063)
- xfce4-panel New Fork (PID: 6241, Parent: 2063)
- xfce4-panel New Fork (PID: 6242, Parent: 2063)
- xfce4-panel New Fork (PID: 6243, Parent: 2063)
- wrapper-2.0 New Fork (PID: 6262, Parent: 6243)
- xfce4-panel New Fork (PID: 6244, Parent: 2063)
- xfce4-panel New Fork (PID: 6245, Parent: 2063)
- dbus-daemon New Fork (PID: 6261, Parent: 6260)
- systemd New Fork (PID: 6269, Parent: 1860)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Mirai | Mirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world. | No Attribution |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Mirai_5 | Yara detected Mirai | Joe Security | ||
JoeSecurity_Mirai_8 | Yara detected Mirai | Joe Security | ||
MAL_ELF_LNX_Mirai_Oct10_2 | Detects ELF malware Mirai related | Florian Roth |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Mirai_12 | Yara detected Mirai | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Mirai_5 | Yara detected Mirai | Joe Security | ||
JoeSecurity_Mirai_8 | Yara detected Mirai | Joe Security | ||
MAL_ELF_LNX_Mirai_Oct10_2 | Detects ELF malware Mirai related | Florian Roth |
| |
JoeSecurity_Mirai_5 | Yara detected Mirai | Joe Security | ||
JoeSecurity_Mirai_8 | Yara detected Mirai | Joe Security | ||
Click to see the 1 entries |
Timestamp: | 192.168.2.2350.51.255.384723475472023548 11/01/23-15:44:00.902937 |
SID: | 2023548 |
Source Port: | 47234 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23221.160.221.34284675472023548 11/01/23-15:44:34.044548 |
SID: | 2023548 |
Source Port: | 42846 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2372.29.178.3842694802030092 11/01/23-15:44:17.173402 |
SID: | 2030092 |
Source Port: | 42694 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.69.85.2535744802025883 11/01/23-15:43:32.936745 |
SID: | 2025883 |
Source Port: | 35744 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2388.126.78.17538908802025883 11/01/23-15:43:15.051321 |
SID: | 2025883 |
Source Port: | 38908 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2323.214.136.17043542802030092 11/01/23-15:44:34.142366 |
SID: | 2030092 |
Source Port: | 43542 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2334.111.150.16652092802025883 11/01/23-15:44:04.173283 |
SID: | 2025883 |
Source Port: | 52092 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2335.190.10.18853306802025883 11/01/23-15:44:12.111557 |
SID: | 2025883 |
Source Port: | 53306 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2376.139.88.1714955075472023548 11/01/23-15:43:44.927332 |
SID: | 2023548 |
Source Port: | 49550 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23172.90.233.633738475472023548 11/01/23-15:43:50.259889 |
SID: | 2023548 |
Source Port: | 37384 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23156.254.99.24343542528692027339 11/01/23-15:43:22.560913 |
SID: | 2027339 |
Source Port: | 43542 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23184.15.117.149764802030092 11/01/23-15:43:58.665505 |
SID: | 2030092 |
Source Port: | 49764 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23125.154.67.1473917675472023548 11/01/23-15:43:31.315376 |
SID: | 2023548 |
Source Port: | 39176 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23162.55.37.3058302802025883 11/01/23-15:43:31.966092 |
SID: | 2025883 |
Source Port: | 58302 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23102.218.241.20349832802030092 11/01/23-15:44:34.984348 |
SID: | 2030092 |
Source Port: | 49832 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23114.30.157.1695049275472023548 11/01/23-15:43:23.332474 |
SID: | 2023548 |
Source Port: | 50492 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2347.135.248.444148802030092 11/01/23-15:43:14.789209 |
SID: | 2030092 |
Source Port: | 44148 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2338.55.145.7040738802025883 11/01/23-15:44:43.167104 |
SID: | 2025883 |
Source Port: | 40738 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23107.162.149.14743780802025883 11/01/23-15:42:54.072804 |
SID: | 2025883 |
Source Port: | 43780 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2314.90.246.325599275472023548 11/01/23-15:43:15.270036 |
SID: | 2023548 |
Source Port: | 55992 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2323.253.138.24160074802025883 11/01/23-15:43:51.896801 |
SID: | 2025883 |
Source Port: | 60074 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2366.129.112.11758312802025883 11/01/23-15:44:30.044424 |
SID: | 2025883 |
Source Port: | 58312 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2369.207.206.773429675472023548 11/01/23-15:43:27.391658 |
SID: | 2023548 |
Source Port: | 34296 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2361.81.152.1516048475472023548 11/01/23-15:43:41.566864 |
SID: | 2023548 |
Source Port: | 60484 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2391.137.201.264695275472023548 11/01/23-15:43:31.409294 |
SID: | 2023548 |
Source Port: | 46952 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23184.51.71.9744974802030092 11/01/23-15:44:36.720914 |
SID: | 2030092 |
Source Port: | 44974 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23201.87.34.273817075472023548 11/01/23-15:43:14.915151 |
SID: | 2023548 |
Source Port: | 38170 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23198.37.56.12158712802025883 11/01/23-15:43:21.139500 |
SID: | 2025883 |
Source Port: | 58712 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23211.216.185.575761875472023548 11/01/23-15:42:54.300711 |
SID: | 2023548 |
Source Port: | 57618 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23181.164.205.825911075472023548 11/01/23-15:43:42.538772 |
SID: | 2023548 |
Source Port: | 59110 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2359.14.37.1785303675472023548 11/01/23-15:43:30.273001 |
SID: | 2023548 |
Source Port: | 53036 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2341.102.14.514754875472023548 11/01/23-15:44:18.249982 |
SID: | 2023548 |
Source Port: | 47548 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23181.166.175.2324136075472023548 11/01/23-15:44:21.224177 |
SID: | 2023548 |
Source Port: | 41360 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23139.130.118.1455286475472023548 11/01/23-15:43:36.960272 |
SID: | 2023548 |
Source Port: | 52864 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23149.160.1.1553350802025883 11/01/23-15:44:10.120609 |
SID: | 2025883 |
Source Port: | 53350 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2337.112.117.1534610275472023548 11/01/23-15:44:06.294599 |
SID: | 2023548 |
Source Port: | 46102 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2323.82.173.7033700802030092 11/01/23-15:43:55.496773 |
SID: | 2030092 |
Source Port: | 33700 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23178.252.26.25360764802030092 11/01/23-15:43:15.849656 |
SID: | 2030092 |
Source Port: | 60764 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23183.104.50.753711475472023548 11/01/23-15:43:36.949949 |
SID: | 2023548 |
Source Port: | 37114 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23192.185.111.2637004802030092 11/01/23-15:43:16.338944 |
SID: | 2030092 |
Source Port: | 37004 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23105.68.36.2455217875472023548 11/01/23-15:44:23.683849 |
SID: | 2023548 |
Source Port: | 52178 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2337.107.12.635483475472023548 11/01/23-15:43:30.421199 |
SID: | 2023548 |
Source Port: | 54834 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23182.16.26.14654124802025576 11/01/23-15:43:39.164079 |
SID: | 2025576 |
Source Port: | 54124 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2365.78.184.4053024802025883 11/01/23-15:43:58.890598 |
SID: | 2025883 |
Source Port: | 53024 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23191.183.35.64009875472023548 11/01/23-15:44:47.139037 |
SID: | 2023548 |
Source Port: | 40098 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2388.252.38.704755875472023548 11/01/23-15:44:06.347148 |
SID: | 2023548 |
Source Port: | 47558 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2380.56.178.25147578802030092 11/01/23-15:43:44.934473 |
SID: | 2030092 |
Source Port: | 47578 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23119.193.0.473839275472023548 11/01/23-15:43:54.400556 |
SID: | 2023548 |
Source Port: | 38392 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23172.82.174.7352798802030092 11/01/23-15:43:32.120603 |
SID: | 2030092 |
Source Port: | 52798 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2366.129.112.11758722802030092 11/01/23-15:44:42.907726 |
SID: | 2030092 |
Source Port: | 58722 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2350.114.162.2052676802030092 11/01/23-15:44:51.177699 |
SID: | 2030092 |
Source Port: | 52676 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23217.21.78.12360746802025883 11/01/23-15:43:54.163753 |
SID: | 2025883 |
Source Port: | 60746 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2337.112.117.1534609275472023548 11/01/23-15:44:06.071433 |
SID: | 2023548 |
Source Port: | 46092 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23107.148.181.19758584802030092 11/01/23-15:43:44.566862 |
SID: | 2030092 |
Source Port: | 58584 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2386.140.139.1114885875472023548 11/01/23-15:43:30.315456 |
SID: | 2023548 |
Source Port: | 48858 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23201.235.54.673661075472023548 11/01/23-15:43:36.148815 |
SID: | 2023548 |
Source Port: | 36610 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23220.134.39.16135996802025576 11/01/23-15:43:39.851026 |
SID: | 2025576 |
Source Port: | 35996 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2314.203.61.795074275472023548 11/01/23-15:44:24.945219 |
SID: | 2023548 |
Source Port: | 50742 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2354.66.115.3450140802025576 11/01/23-15:43:40.300950 |
SID: | 2025576 |
Source Port: | 50140 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2389.137.46.9352342802025883 11/01/23-15:43:16.479338 |
SID: | 2025883 |
Source Port: | 52342 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23192.174.72.1242996802025883 11/01/23-15:44:07.590942 |
SID: | 2025883 |
Source Port: | 42996 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2347.149.114.1953334475472023548 11/01/23-15:44:16.795835 |
SID: | 2023548 |
Source Port: | 33344 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23174.17.181.1775243675472023548 11/01/23-15:44:11.825056 |
SID: | 2023548 |
Source Port: | 52436 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2346.242.129.20543950802025576 11/01/23-15:43:44.096115 |
SID: | 2025576 |
Source Port: | 43950 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2399.249.245.1453822075472023548 11/01/23-15:44:48.198056 |
SID: | 2023548 |
Source Port: | 38220 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23156.226.79.7754574802025883 11/01/23-15:44:40.236437 |
SID: | 2025883 |
Source Port: | 54574 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23177.140.197.1404122875472023548 11/01/23-15:44:13.479350 |
SID: | 2023548 |
Source Port: | 41228 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23112.187.161.555077875472023548 11/01/23-15:43:37.382331 |
SID: | 2023548 |
Source Port: | 50778 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23104.25.53.5757894802030092 11/01/23-15:44:14.965920 |
SID: | 2030092 |
Source Port: | 57894 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23144.91.114.20147250802025883 11/01/23-15:44:10.179577 |
SID: | 2025883 |
Source Port: | 47250 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2341.227.168.2486049275472023548 11/01/23-15:44:22.459829 |
SID: | 2023548 |
Source Port: | 60492 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23118.53.39.143944075472023548 11/01/23-15:43:30.539684 |
SID: | 2023548 |
Source Port: | 39440 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23181.167.65.305798475472023548 11/01/23-15:44:06.112684 |
SID: | 2023548 |
Source Port: | 57984 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2313.226.113.20235994802025576 11/01/23-15:43:40.311818 |
SID: | 2025576 |
Source Port: | 35994 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23120.88.174.1335874475472023548 11/01/23-15:43:22.175907 |
SID: | 2023548 |
Source Port: | 58744 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2350.2.178.18636822802025883 11/01/23-15:44:04.174582 |
SID: | 2025883 |
Source Port: | 36822 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23112.169.118.1285697675472023548 11/01/23-15:44:12.722982 |
SID: | 2023548 |
Source Port: | 56976 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23208.123.187.1004268475472023548 11/01/23-15:43:27.172139 |
SID: | 2023548 |
Source Port: | 42684 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23115.20.201.2015435475472023548 11/01/23-15:43:17.789429 |
SID: | 2023548 |
Source Port: | 54354 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23104.17.27.17843650802030092 11/01/23-15:43:58.639788 |
SID: | 2030092 |
Source Port: | 43650 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.34.96.2842592802025883 11/01/23-15:43:45.116691 |
SID: | 2025883 |
Source Port: | 42592 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2313.228.195.11340050802025883 11/01/23-15:44:21.548206 |
SID: | 2025883 |
Source Port: | 40050 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2395.100.217.14151628802025576 11/01/23-15:43:40.342235 |
SID: | 2025576 |
Source Port: | 51628 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23208.106.198.22841118802030092 11/01/23-15:44:07.608147 |
SID: | 2030092 |
Source Port: | 41118 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.232.19.15.22748156802030092 11/01/23-15:44:33.856980 |
SID: | 2030092 |
Source Port: | 48156 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23112.186.138.135287275472023548 11/01/23-15:44:30.608856 |
SID: | 2023548 |
Source Port: | 52872 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23181.4.134.524692675472023548 11/01/23-15:44:33.319516 |
SID: | 2023548 |
Source Port: | 46926 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2323.82.13.11150916802030092 11/01/23-15:44:50.869732 |
SID: | 2030092 |
Source Port: | 50916 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2371.30.39.394467875472023548 11/01/23-15:43:37.234331 |
SID: | 2023548 |
Source Port: | 44678 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2345.223.151.1174098075472023548 11/01/23-15:44:17.279797 |
SID: | 2023548 |
Source Port: | 40980 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2350.124.59.1884673475472023548 11/01/23-15:44:20.953239 |
SID: | 2023548 |
Source Port: | 46734 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2380.244.186.24139402802030092 11/01/23-15:44:33.827447 |
SID: | 2030092 |
Source Port: | 39402 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.39.119.19246520802025883 11/01/23-15:44:16.832564 |
SID: | 2025883 |
Source Port: | 46520 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23118.172.31.2005490675472023548 11/01/23-15:44:30.685750 |
SID: | 2023548 |
Source Port: | 54906 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23190.246.121.1083479275472023548 11/01/23-15:44:17.876207 |
SID: | 2023548 |
Source Port: | 34792 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23104.94.119.12237562802025883 11/01/23-15:44:37.103573 |
SID: | 2025883 |
Source Port: | 37562 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23181.4.134.524702075472023548 11/01/23-15:44:36.314662 |
SID: | 2023548 |
Source Port: | 47020 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2343.230.170.3047026802025883 11/01/23-15:44:11.638542 |
SID: | 2025883 |
Source Port: | 47026 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23156.254.132.21758706802025883 11/01/23-15:43:31.793646 |
SID: | 2025883 |
Source Port: | 58706 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23104.85.151.22152644802025883 11/01/23-15:44:28.009637 |
SID: | 2025883 |
Source Port: | 52644 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2354.86.11.5451700802025883 11/01/23-15:43:56.211770 |
SID: | 2025883 |
Source Port: | 51700 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23107.21.194.5848014802025883 11/01/23-15:44:30.136710 |
SID: | 2025883 |
Source Port: | 48014 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23181.29.44.1503894475472023548 11/01/23-15:44:01.006577 |
SID: | 2023548 |
Source Port: | 38944 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23181.166.234.2295891875472023548 11/01/23-15:43:45.054483 |
SID: | 2023548 |
Source Port: | 58918 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2314.40.253.755390875472023548 11/01/23-15:44:22.517209 |
SID: | 2023548 |
Source Port: | 53908 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23109.145.115.6546510802030092 11/01/23-15:44:11.273354 |
SID: | 2030092 |
Source Port: | 46510 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2338.100.221.15739772802030092 11/01/23-15:44:49.966704 |
SID: | 2030092 |
Source Port: | 39772 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2350.109.83.2394221875472023548 11/01/23-15:44:39.898689 |
SID: | 2023548 |
Source Port: | 42218 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2389.148.228.954193475472023548 11/01/23-15:44:10.469714 |
SID: | 2023548 |
Source Port: | 41934 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2386.185.86.2445001075472023548 11/01/23-15:44:21.130446 |
SID: | 2023548 |
Source Port: | 50010 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2313.125.106.17755622802025883 11/01/23-15:44:41.417009 |
SID: | 2025883 |
Source Port: | 55622 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2375.80.106.2533829875472023548 11/01/23-15:44:01.619451 |
SID: | 2023548 |
Source Port: | 38298 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2369.146.26.433962875472023548 11/01/23-15:44:30.492975 |
SID: | 2023548 |
Source Port: | 39628 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23146.71.37.17651718802025883 11/01/23-15:42:54.130098 |
SID: | 2025883 |
Source Port: | 51718 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23209.89.148.5537046802025883 11/01/23-15:43:39.860301 |
SID: | 2025883 |
Source Port: | 37046 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23222.117.99.2035972475472023548 11/01/23-15:43:45.393793 |
SID: | 2023548 |
Source Port: | 59724 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23156.254.81.3357578528692027339 11/01/23-15:43:37.815712 |
SID: | 2027339 |
Source Port: | 57578 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23156.254.92.955928528692027339 11/01/23-15:44:48.858094 |
SID: | 2027339 |
Source Port: | 55928 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2323.59.221.20345048802025883 11/01/23-15:43:32.909511 |
SID: | 2025883 |
Source Port: | 45048 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2399.242.239.553711675472023548 11/01/23-15:44:01.405107 |
SID: | 2023548 |
Source Port: | 37116 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2371.76.247.1135163675472023548 11/01/23-15:44:40.484576 |
SID: | 2023548 |
Source Port: | 51636 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2318.197.134.14658710802030092 11/01/23-15:44:37.188831 |
SID: | 2030092 |
Source Port: | 58710 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.203.100.5135698802025883 11/01/23-15:44:49.882365 |
SID: | 2025883 |
Source Port: | 35698 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2389.100.213.1483557875472023548 11/01/23-15:44:30.690562 |
SID: | 2023548 |
Source Port: | 35578 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23104.106.244.9139796802030092 11/01/23-15:44:33.755161 |
SID: | 2030092 |
Source Port: | 39796 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23186.13.16.975820275472023548 11/01/23-15:43:16.246155 |
SID: | 2023548 |
Source Port: | 58202 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2351.38.23.9139998802030092 11/01/23-15:44:20.193829 |
SID: | 2030092 |
Source Port: | 39998 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23173.35.114.1665798275472023548 11/01/23-15:43:45.042520 |
SID: | 2023548 |
Source Port: | 57982 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23203.77.200.13156696802025883 11/01/23-15:44:28.567847 |
SID: | 2025883 |
Source Port: | 56696 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2335.188.156.15136532802025883 11/01/23-15:43:45.059133 |
SID: | 2025883 |
Source Port: | 36532 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23122.201.101.20252660802030092 11/01/23-15:43:35.347447 |
SID: | 2030092 |
Source Port: | 52660 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2364.223.129.1916077875472023548 11/01/23-15:44:35.026051 |
SID: | 2023548 |
Source Port: | 60778 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2391.209.94.20253388802025883 11/01/23-15:44:43.221615 |
SID: | 2025883 |
Source Port: | 53388 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23174.100.30.15656142802030092 11/01/23-15:44:07.589480 |
SID: | 2030092 |
Source Port: | 56142 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.27.24.6556258802030092 11/01/23-15:44:37.103323 |
SID: | 2030092 |
Source Port: | 56258 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.85.171.1939240802030092 11/01/23-15:44:07.460968 |
SID: | 2030092 |
Source Port: | 39240 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2354.151.163.17051048802030092 11/01/23-15:43:33.398465 |
SID: | 2030092 |
Source Port: | 51048 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2354.68.187.10954406802025883 11/01/23-15:44:21.002270 |
SID: | 2025883 |
Source Port: | 54406 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2369.163.238.11354156802025576 11/01/23-15:43:27.665134 |
SID: | 2025576 |
Source Port: | 54156 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23118.57.135.1163850875472023548 11/01/23-15:44:11.895551 |
SID: | 2023548 |
Source Port: | 38508 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2320.27.77.10760736802030092 11/01/23-15:43:26.866222 |
SID: | 2030092 |
Source Port: | 60736 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2313.226.113.20236074802025576 11/01/23-15:43:43.864165 |
SID: | 2025576 |
Source Port: | 36074 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23156.254.111.18434426528692027339 11/01/23-15:44:09.485632 |
SID: | 2027339 |
Source Port: | 34426 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23104.96.253.10558440802025883 11/01/23-15:44:07.553193 |
SID: | 2025883 |
Source Port: | 58440 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2345.87.235.6346444802030092 11/01/23-15:44:15.187456 |
SID: | 2030092 |
Source Port: | 46444 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2399.251.232.1654876475472023548 11/01/23-15:44:17.906593 |
SID: | 2023548 |
Source Port: | 48764 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23175.244.32.1355257475472023548 11/01/23-15:44:48.515985 |
SID: | 2023548 |
Source Port: | 52574 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23184.185.32.6555946232027973 11/01/23-15:43:33.850319 |
SID: | 2027973 |
Source Port: | 55946 |
Destination Port: | 23 |
Protocol: | TCP |
Classtype: | Attempt to login by a default username and password |
Timestamp: | 192.168.2.2366.24.36.1943358475472023548 11/01/23-15:43:37.071907 |
SID: | 2023548 |
Source Port: | 33584 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2345.87.235.6346418802025883 11/01/23-15:44:15.075784 |
SID: | 2025883 |
Source Port: | 46418 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2388.120.116.149848802025883 11/01/23-15:44:51.138611 |
SID: | 2025883 |
Source Port: | 49848 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2352.154.158.8645488802025883 11/01/23-15:44:16.756192 |
SID: | 2025883 |
Source Port: | 45488 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23207.60.142.14749694802025883 11/01/23-15:44:11.268225 |
SID: | 2025883 |
Source Port: | 49694 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2323.59.221.20345074802025883 11/01/23-15:43:32.208053 |
SID: | 2025883 |
Source Port: | 45074 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2323.58.253.17238418802025576 11/01/23-15:43:44.885479 |
SID: | 2025576 |
Source Port: | 38418 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2391.137.201.264693675472023548 11/01/23-15:43:31.210519 |
SID: | 2023548 |
Source Port: | 46936 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23154.223.116.22038168802025883 11/01/23-15:44:51.962413 |
SID: | 2025883 |
Source Port: | 38168 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23146.190.156.20253322802025883 11/01/23-15:43:58.903404 |
SID: | 2025883 |
Source Port: | 53322 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2392.40.144.2205151275472023548 11/01/23-15:44:45.182159 |
SID: | 2023548 |
Source Port: | 51512 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23107.23.224.23142302802025883 11/01/23-15:44:51.891694 |
SID: | 2025883 |
Source Port: | 42302 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.238.142.79.9246910802025883 11/01/23-15:43:26.913044 |
SID: | 2025883 |
Source Port: | 46910 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23183.104.50.753723075472023548 11/01/23-15:43:37.241350 |
SID: | 2023548 |
Source Port: | 37230 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23218.40.69.1584391675472023548 11/01/23-15:44:48.804387 |
SID: | 2023548 |
Source Port: | 43916 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23186.139.111.2484984475472023548 11/01/23-15:44:12.127330 |
SID: | 2023548 |
Source Port: | 49844 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23139.9.34.20148504802030092 11/01/23-15:43:53.002253 |
SID: | 2030092 |
Source Port: | 48504 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23211.198.1.183680675472023548 11/01/23-15:43:14.981657 |
SID: | 2023548 |
Source Port: | 36806 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23154.93.162.8549688802025883 11/01/23-15:43:40.972537 |
SID: | 2025883 |
Source Port: | 49688 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23174.84.11.5346416802025883 11/01/23-15:44:03.959353 |
SID: | 2025883 |
Source Port: | 46416 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23156.254.111.21232814528692027339 11/01/23-15:44:17.871264 |
SID: | 2027339 |
Source Port: | 32814 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2352.14.151.15049296802025883 11/01/23-15:44:25.319729 |
SID: | 2025883 |
Source Port: | 49296 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23191.252.203.11753550802025883 11/01/23-15:43:43.512641 |
SID: | 2025883 |
Source Port: | 53550 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23188.166.51.24940736802025883 11/01/23-15:43:39.859088 |
SID: | 2025883 |
Source Port: | 40736 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23198.13.48.22154632802025883 11/01/23-15:44:35.271702 |
SID: | 2025883 |
Source Port: | 54632 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2314.66.138.1533758275472023548 11/01/23-15:44:00.038642 |
SID: | 2023548 |
Source Port: | 37582 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2323.27.217.1245628802025883 11/01/23-15:44:34.929605 |
SID: | 2025883 |
Source Port: | 45628 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2327.235.187.996007275472023548 11/01/23-15:43:41.566771 |
SID: | 2023548 |
Source Port: | 60072 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2347.183.253.2454838075472023548 11/01/23-15:44:37.334512 |
SID: | 2023548 |
Source Port: | 48380 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23118.150.136.2054831675472023548 11/01/23-15:44:45.598968 |
SID: | 2023548 |
Source Port: | 48316 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23216.247.161.8156882802025883 11/01/23-15:44:15.058435 |
SID: | 2025883 |
Source Port: | 56882 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23189.18.112.1874674075472023548 11/01/23-15:44:00.220144 |
SID: | 2023548 |
Source Port: | 46740 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23156.241.92.24755090528692027339 11/01/23-15:44:47.853093 |
SID: | 2027339 |
Source Port: | 55090 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23153.149.177.24640088802025883 11/01/23-15:44:27.935655 |
SID: | 2025883 |
Source Port: | 40088 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2318.220.131.19941658802025576 11/01/23-15:43:33.099237 |
SID: | 2025576 |
Source Port: | 41658 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23184.31.75.13746190802025883 11/01/23-15:43:55.411439 |
SID: | 2025883 |
Source Port: | 46190 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23119.216.212.2333611675472023548 11/01/23-15:44:12.727010 |
SID: | 2023548 |
Source Port: | 36116 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2386.137.228.1066018275472023548 11/01/23-15:43:26.723290 |
SID: | 2023548 |
Source Port: | 60182 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23202.188.238.4253110802025883 11/01/23-15:44:16.198452 |
SID: | 2025883 |
Source Port: | 53110 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2314.66.138.1533755875472023548 11/01/23-15:43:59.747596 |
SID: | 2023548 |
Source Port: | 37558 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23156.251.133.5242710802025883 11/01/23-15:43:26.744591 |
SID: | 2025883 |
Source Port: | 42710 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2344.215.46.24235158802025883 11/01/23-15:44:04.134912 |
SID: | 2025883 |
Source Port: | 35158 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23104.228.195.1655500075472023548 11/01/23-15:44:13.278974 |
SID: | 2023548 |
Source Port: | 55000 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23176.29.126.2375909875472023548 11/01/23-15:44:21.923879 |
SID: | 2023548 |
Source Port: | 59098 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23104.64.123.11358146802030092 11/01/23-15:43:27.934269 |
SID: | 2030092 |
Source Port: | 58146 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23213.128.185.625654475472023548 11/01/23-15:44:17.866032 |
SID: | 2023548 |
Source Port: | 56544 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2323.63.117.6253842802025576 11/01/23-15:43:33.198782 |
SID: | 2025576 |
Source Port: | 53842 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2385.152.162.15548686802025576 11/01/23-15:43:43.738189 |
SID: | 2025576 |
Source Port: | 48686 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2394.71.148.173887675472023548 11/01/23-15:43:36.360883 |
SID: | 2023548 |
Source Port: | 38876 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2391.108.151.17449632802025883 11/01/23-15:43:28.664536 |
SID: | 2025883 |
Source Port: | 49632 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2313.42.174.7355216802030092 11/01/23-15:43:40.026689 |
SID: | 2030092 |
Source Port: | 55216 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23190.247.215.1734227675472023548 11/01/23-15:44:22.213641 |
SID: | 2023548 |
Source Port: | 42276 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23185.246.90.13743844802030092 11/01/23-15:44:16.839287 |
SID: | 2030092 |
Source Port: | 43844 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23221.161.0.1935494875472023548 11/01/23-15:44:48.804336 |
SID: | 2023548 |
Source Port: | 54948 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23119.193.0.473841275472023548 11/01/23-15:43:54.693398 |
SID: | 2023548 |
Source Port: | 38412 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2347.146.94.1296088475472023548 11/01/23-15:43:31.105953 |
SID: | 2023548 |
Source Port: | 60884 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2367.199.38.5053824802030092 11/01/23-15:43:58.879921 |
SID: | 2030092 |
Source Port: | 53824 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23184.29.214.19550412802030092 11/01/23-15:43:21.434670 |
SID: | 2030092 |
Source Port: | 50412 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.232.23.255.541378802030092 11/01/23-15:44:35.297099 |
SID: | 2030092 |
Source Port: | 41378 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2354.145.45.12558556802030092 11/01/23-15:44:18.462067 |
SID: | 2030092 |
Source Port: | 58556 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23162.241.11.14234998802030092 11/01/23-15:43:40.037226 |
SID: | 2030092 |
Source Port: | 34998 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23196.51.48.12640078802025883 11/01/23-15:43:26.756079 |
SID: | 2025883 |
Source Port: | 40078 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2375.147.83.7749560802030092 11/01/23-15:44:52.125546 |
SID: | 2030092 |
Source Port: | 49560 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2338.23.230.2303286875472023548 11/01/23-15:43:30.194363 |
SID: | 2023548 |
Source Port: | 32868 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2318.160.19.19634152802025883 11/01/23-15:44:10.882711 |
SID: | 2025883 |
Source Port: | 34152 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23156.230.25.11640236528692027339 11/01/23-15:43:37.815586 |
SID: | 2027339 |
Source Port: | 40236 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2347.96.103.9150760802025883 11/01/23-15:44:10.468022 |
SID: | 2025883 |
Source Port: | 50760 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23200.88.2.25541590802025883 11/01/23-15:44:33.809387 |
SID: | 2025883 |
Source Port: | 41590 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23156.226.79.7754654802030092 11/01/23-15:44:43.108213 |
SID: | 2030092 |
Source Port: | 54654 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23118.63.192.2263374075472023548 11/01/23-15:44:06.817223 |
SID: | 2023548 |
Source Port: | 33740 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23216.152.2.18549432802025883 11/01/23-15:44:11.097806 |
SID: | 2025883 |
Source Port: | 49432 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2388.157.102.11560062802030092 11/01/23-15:44:17.188333 |
SID: | 2030092 |
Source Port: | 60062 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2371.71.237.194856675472023548 11/01/23-15:43:27.529481 |
SID: | 2023548 |
Source Port: | 48566 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23118.35.240.424411675472023548 11/01/23-15:43:49.310555 |
SID: | 2023548 |
Source Port: | 44116 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23118.40.124.403716475472023548 11/01/23-15:44:41.606286 |
SID: | 2023548 |
Source Port: | 37164 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2399.236.11.795052475472023548 11/01/23-15:43:35.900454 |
SID: | 2023548 |
Source Port: | 50524 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2394.99.160.2463310075472023548 11/01/23-15:44:30.609866 |
SID: | 2023548 |
Source Port: | 33100 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2399.227.28.264522675472023548 11/01/23-15:43:53.513477 |
SID: | 2023548 |
Source Port: | 45226 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23221.152.185.2503751475472023548 11/01/23-15:44:00.321084 |
SID: | 2023548 |
Source Port: | 37514 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23186.189.224.19137134802030092 11/01/23-15:43:15.186709 |
SID: | 2030092 |
Source Port: | 37134 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2335.212.83.15948932802025883 11/01/23-15:43:40.771231 |
SID: | 2025883 |
Source Port: | 48932 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2327.213.99.2065967075472023548 11/01/23-15:43:53.871189 |
SID: | 2023548 |
Source Port: | 59670 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2375.80.106.2533829275472023548 11/01/23-15:44:01.442821 |
SID: | 2023548 |
Source Port: | 38292 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23114.35.182.5256980802025883 11/01/23-15:43:29.460017 |
SID: | 2025883 |
Source Port: | 56980 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23147.46.58.1674547675472023548 11/01/23-15:44:30.439497 |
SID: | 2023548 |
Source Port: | 45476 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2391.108.151.17449632802030092 11/01/23-15:43:28.664536 |
SID: | 2030092 |
Source Port: | 49632 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2354.226.41.3941590802025883 11/01/23-15:43:58.639584 |
SID: | 2025883 |
Source Port: | 41590 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2323.80.26.23642628802030092 11/01/23-15:44:41.107463 |
SID: | 2030092 |
Source Port: | 42628 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2331.136.242.5757102802030092 11/01/23-15:44:05.078631 |
SID: | 2030092 |
Source Port: | 57102 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2362.73.25.3540150802025883 11/01/23-15:44:37.180556 |
SID: | 2025883 |
Source Port: | 40150 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2323.39.146.18438420802030092 11/01/23-15:44:35.005272 |
SID: | 2030092 |
Source Port: | 38420 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2396.114.149.6232856802030092 11/01/23-15:44:41.055337 |
SID: | 2030092 |
Source Port: | 32856 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2397.113.35.254399875472023548 11/01/23-15:43:21.011733 |
SID: | 2023548 |
Source Port: | 43998 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2343.153.20.17635198802025883 11/01/23-15:44:07.458744 |
SID: | 2025883 |
Source Port: | 35198 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23125.149.19.895797075472023548 11/01/23-15:43:31.610756 |
SID: | 2023548 |
Source Port: | 57970 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23183.96.90.484498275472023548 11/01/23-15:44:11.902031 |
SID: | 2023548 |
Source Port: | 44982 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23186.152.222.915624275472023548 11/01/23-15:44:40.458283 |
SID: | 2023548 |
Source Port: | 56242 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2364.50.167.18949522802025883 11/01/23-15:44:41.179940 |
SID: | 2025883 |
Source Port: | 49522 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23139.9.34.20148594802030092 11/01/23-15:43:54.361057 |
SID: | 2030092 |
Source Port: | 48594 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23188.117.28.20258394802030092 11/01/23-15:44:50.981171 |
SID: | 2030092 |
Source Port: | 58394 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23118.57.135.1163845675472023548 11/01/23-15:44:11.603108 |
SID: | 2023548 |
Source Port: | 38456 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2385.214.86.3253268802025883 11/01/23-15:44:50.973025 |
SID: | 2025883 |
Source Port: | 53268 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2362.29.65.18356684528692027339 11/01/23-15:43:59.402737 |
SID: | 2027339 |
Source Port: | 56684 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23211.106.9.183702475472023548 11/01/23-15:43:36.701672 |
SID: | 2023548 |
Source Port: | 37024 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2345.230.144.10757432802025576 11/01/23-15:43:16.779474 |
SID: | 2025576 |
Source Port: | 57432 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23175.201.244.14166475472023548 11/01/23-15:44:29.698130 |
SID: | 2023548 |
Source Port: | 41664 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23188.172.224.5956196802030092 11/01/23-15:44:26.383916 |
SID: | 2030092 |
Source Port: | 56196 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2399.236.11.795048675472023548 11/01/23-15:43:35.772644 |
SID: | 2023548 |
Source Port: | 50486 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23156.241.88.24545836528692027339 11/01/23-15:43:36.825923 |
SID: | 2027339 |
Source Port: | 45836 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23211.216.185.575793075472023548 11/01/23-15:42:54.591288 |
SID: | 2023548 |
Source Port: | 57930 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23129.159.240.7955042802025576 11/01/23-15:43:39.727968 |
SID: | 2025576 |
Source Port: | 55042 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23200.88.2.25541590802030092 11/01/23-15:44:33.809387 |
SID: | 2030092 |
Source Port: | 41590 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23198.13.48.22154632802030092 11/01/23-15:44:35.271702 |
SID: | 2030092 |
Source Port: | 54632 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23149.0.169.1344858475472023548 11/01/23-15:44:45.889925 |
SID: | 2023548 |
Source Port: | 48584 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23213.128.185.625659675472023548 11/01/23-15:44:18.079695 |
SID: | 2023548 |
Source Port: | 56596 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23112.187.161.555079475472023548 11/01/23-15:43:37.698540 |
SID: | 2023548 |
Source Port: | 50794 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23190.246.121.1083484675472023548 11/01/23-15:44:18.129833 |
SID: | 2023548 |
Source Port: | 34846 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2350.50.254.1324630675472023548 11/01/23-15:44:10.264590 |
SID: | 2023548 |
Source Port: | 46306 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2372.35.109.1963700075472023548 11/01/23-15:44:10.527177 |
SID: | 2023548 |
Source Port: | 37000 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2338.145.101.5041822802030092 11/01/23-15:44:15.350700 |
SID: | 2030092 |
Source Port: | 41822 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23220.116.19.1654926875472023548 11/01/23-15:43:31.602642 |
SID: | 2023548 |
Source Port: | 49268 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2341.101.116.1433455075472023548 11/01/23-15:43:42.477972 |
SID: | 2023548 |
Source Port: | 34550 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23201.211.173.4260754802030092 11/01/23-15:44:15.334253 |
SID: | 2030092 |
Source Port: | 60754 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.228.195.1655499475472023548 11/01/23-15:44:13.137908 |
SID: | 2023548 |
Source Port: | 54994 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2323.200.248.17455788802025883 11/01/23-15:44:18.461571 |
SID: | 2025883 |
Source Port: | 55788 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2314.198.77.3848980802025883 11/01/23-15:44:28.524319 |
SID: | 2025883 |
Source Port: | 48980 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2352.59.173.2938108802025883 11/01/23-15:42:55.165589 |
SID: | 2025883 |
Source Port: | 38108 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23167.250.171.4954682802030092 11/01/23-15:43:54.261577 |
SID: | 2030092 |
Source Port: | 54682 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23173.23.119.17547456802030092 11/01/23-15:44:15.186011 |
SID: | 2030092 |
Source Port: | 47456 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.232.189.158.345190475472023548 11/01/23-15:44:31.010925 |
SID: | 2023548 |
Source Port: | 51904 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23154.92.65.456954802025883 11/01/23-15:44:15.226855 |
SID: | 2025883 |
Source Port: | 56954 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23162.241.11.14234998802025883 11/01/23-15:43:40.037226 |
SID: | 2025883 |
Source Port: | 34998 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2350.109.83.2394223075472023548 11/01/23-15:44:41.088006 |
SID: | 2023548 |
Source Port: | 42230 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2313.236.118.13153988802025883 11/01/23-15:43:44.714267 |
SID: | 2025883 |
Source Port: | 53988 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2391.121.39.1451124802030092 11/01/23-15:44:26.371313 |
SID: | 2030092 |
Source Port: | 51124 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23146.160.221.836750802025883 11/01/23-15:42:55.364546 |
SID: | 2025883 |
Source Port: | 36750 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23189.41.238.1654899075472023548 11/01/23-15:44:40.434723 |
SID: | 2023548 |
Source Port: | 48990 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23212.93.111.16252242528692025132 11/01/23-15:43:40.802942 |
SID: | 2025132 |
Source Port: | 52242 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | Attempted User Privilege Gain |
Timestamp: | 192.168.2.2350.124.59.1884674875472023548 11/01/23-15:44:21.085162 |
SID: | 2023548 |
Source Port: | 46748 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23116.206.52.19938532528692027339 11/01/23-15:43:40.976716 |
SID: | 2027339 |
Source Port: | 38532 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2362.29.65.18356684528692025132 11/01/23-15:43:59.402737 |
SID: | 2025132 |
Source Port: | 56684 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | Attempted User Privilege Gain |
Timestamp: | 192.168.2.2313.236.36.4649054802025883 11/01/23-15:42:55.283660 |
SID: | 2025883 |
Source Port: | 49054 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2366.228.47.11856454802030092 11/01/23-15:43:40.771144 |
SID: | 2030092 |
Source Port: | 56454 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23186.127.244.1135562875472023548 11/01/23-15:43:49.548284 |
SID: | 2023548 |
Source Port: | 55628 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2323.214.178.1236058802030092 11/01/23-15:43:27.932159 |
SID: | 2030092 |
Source Port: | 36058 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23101.51.163.1843335475472023548 11/01/23-15:44:40.695774 |
SID: | 2023548 |
Source Port: | 33354 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2335.165.194.8654914802030092 11/01/23-15:44:12.187665 |
SID: | 2030092 |
Source Port: | 54914 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2375.119.185.16451896802030092 11/01/23-15:44:37.114040 |
SID: | 2030092 |
Source Port: | 51896 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.200.222.11446312802030092 11/01/23-15:44:33.874962 |
SID: | 2030092 |
Source Port: | 46312 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.152.100.24159060802025883 11/01/23-15:43:26.724724 |
SID: | 2025883 |
Source Port: | 59060 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23149.30.169.17834382802025883 11/01/23-15:43:35.046708 |
SID: | 2025883 |
Source Port: | 34382 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2345.232.149.1239322802030092 11/01/23-15:43:56.318661 |
SID: | 2030092 |
Source Port: | 39322 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2394.122.27.24938082528692025132 11/01/23-15:43:30.508227 |
SID: | 2025132 |
Source Port: | 38082 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | Attempted User Privilege Gain |
Timestamp: | 192.168.2.23115.20.180.1005540675472023548 11/01/23-15:43:49.314853 |
SID: | 2023548 |
Source Port: | 55406 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23118.49.223.1644336875472023548 11/01/23-15:43:14.982768 |
SID: | 2023548 |
Source Port: | 43368 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23121.187.125.1585916675472023548 11/01/23-15:44:18.377152 |
SID: | 2023548 |
Source Port: | 59166 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2361.83.227.1214533675472023548 11/01/23-15:43:54.545401 |
SID: | 2023548 |
Source Port: | 45336 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2324.212.171.1804143675472023548 11/01/23-15:44:01.275043 |
SID: | 2023548 |
Source Port: | 41436 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2323.134.94.11141606802030092 11/01/23-15:42:54.299151 |
SID: | 2030092 |
Source Port: | 41606 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23119.209.254.2454517875472023548 11/01/23-15:44:34.368130 |
SID: | 2023548 |
Source Port: | 45178 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23121.176.255.275374075472023548 11/01/23-15:43:26.883704 |
SID: | 2023548 |
Source Port: | 53740 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23172.248.68.1223733875472023548 11/01/23-15:43:22.348960 |
SID: | 2023548 |
Source Port: | 37338 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2385.152.162.15548418802025576 11/01/23-15:43:38.735860 |
SID: | 2025576 |
Source Port: | 48418 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2381.169.181.22050236802030092 11/01/23-15:44:34.168741 |
SID: | 2030092 |
Source Port: | 50236 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2347.149.114.1953337875472023548 11/01/23-15:44:16.958095 |
SID: | 2023548 |
Source Port: | 33378 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2314.78.177.1575543875472023548 11/01/23-15:43:16.285607 |
SID: | 2023548 |
Source Port: | 55438 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23172.247.140.15145652802025883 11/01/23-15:44:50.453297 |
SID: | 2025883 |
Source Port: | 45652 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23212.93.111.16252242528692027339 11/01/23-15:43:40.802942 |
SID: | 2027339 |
Source Port: | 52242 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23203.77.200.13156734802025883 11/01/23-15:44:30.277150 |
SID: | 2025883 |
Source Port: | 56734 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2391.236.26.15147206802030092 11/01/23-15:44:50.140193 |
SID: | 2030092 |
Source Port: | 47206 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23118.180.32.3140066802030092 11/01/23-15:44:35.655223 |
SID: | 2030092 |
Source Port: | 40066 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2339.109.34.23050344802025883 11/01/23-15:43:21.263567 |
SID: | 2025883 |
Source Port: | 50344 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2345.150.67.20233076802030092 11/01/23-15:43:43.509682 |
SID: | 2030092 |
Source Port: | 33076 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2314.203.61.795074675472023548 11/01/23-15:44:25.322808 |
SID: | 2023548 |
Source Port: | 50746 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2372.191.226.664778675472023548 11/01/23-15:44:48.197091 |
SID: | 2023548 |
Source Port: | 47786 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23125.135.156.2165135275472023548 11/01/23-15:44:48.809974 |
SID: | 2023548 |
Source Port: | 51352 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23201.87.34.273820675472023548 11/01/23-15:43:15.142615 |
SID: | 2023548 |
Source Port: | 38206 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23194.42.17.25037814802025883 11/01/23-15:43:16.673780 |
SID: | 2025883 |
Source Port: | 37814 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2354.196.186.6843812802025883 11/01/23-15:44:10.084083 |
SID: | 2025883 |
Source Port: | 43812 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2320.119.45.2652316802025883 11/01/23-15:43:44.411736 |
SID: | 2025883 |
Source Port: | 52316 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2394.122.27.24938082528692027339 11/01/23-15:43:30.508227 |
SID: | 2027339 |
Source Port: | 38082 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2323.4.130.14757418802025576 11/01/23-15:43:48.126454 |
SID: | 2025576 |
Source Port: | 57418 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2369.207.206.773430075472023548 11/01/23-15:43:26.538502 |
SID: | 2023548 |
Source Port: | 34300 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2399.227.28.264521475472023548 11/01/23-15:43:53.390815 |
SID: | 2023548 |
Source Port: | 45214 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23221.152.185.2503750275472023548 11/01/23-15:44:00.038229 |
SID: | 2023548 |
Source Port: | 37502 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2344.227.218.7647444802025883 11/01/23-15:43:15.053657 |
SID: | 2025883 |
Source Port: | 47444 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2351.89.117.15436268802025576 11/01/23-15:43:34.291363 |
SID: | 2025576 |
Source Port: | 36268 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2352.221.134.2240404802025883 11/01/23-15:44:01.524116 |
SID: | 2025883 |
Source Port: | 40404 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2354.148.199.3054822802025576 11/01/23-15:43:40.006146 |
SID: | 2025576 |
Source Port: | 54822 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23213.155.225.20253166802025883 11/01/23-15:44:09.992224 |
SID: | 2025883 |
Source Port: | 53166 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2313.248.207.15659666802025883 11/01/23-15:43:56.210484 |
SID: | 2025883 |
Source Port: | 59666 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23188.31.235.2053451875472023548 11/01/23-15:44:07.206228 |
SID: | 2023548 |
Source Port: | 34518 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23183.78.226.7654328802030092 11/01/23-15:42:54.299065 |
SID: | 2030092 |
Source Port: | 54328 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2399.249.245.1453817875472023548 11/01/23-15:44:48.068757 |
SID: | 2023548 |
Source Port: | 38178 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23220.233.107.63347475472023548 11/01/23-15:44:07.190168 |
SID: | 2023548 |
Source Port: | 33474 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23181.166.234.2295897475472023548 11/01/23-15:43:45.331026 |
SID: | 2023548 |
Source Port: | 58974 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23114.117.251.21636156802030092 11/01/23-15:44:10.451976 |
SID: | 2030092 |
Source Port: | 36156 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2318.65.220.23857974802025883 11/01/23-15:43:18.350435 |
SID: | 2025883 |
Source Port: | 57974 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23104.148.103.14135406802025883 11/01/23-15:43:58.894391 |
SID: | 2025883 |
Source Port: | 35406 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2372.191.226.664774475472023548 11/01/23-15:44:48.057822 |
SID: | 2023548 |
Source Port: | 47744 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23173.35.114.1665800275472023548 11/01/23-15:43:45.161236 |
SID: | 2023548 |
Source Port: | 58002 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2372.136.25.1804244275472023548 11/01/23-15:44:34.015350 |
SID: | 2023548 |
Source Port: | 42442 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2323.192.174.6259756802025576 11/01/23-15:43:16.855422 |
SID: | 2025576 |
Source Port: | 59756 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23218.41.147.1043536075472023548 11/01/23-15:43:37.365517 |
SID: | 2023548 |
Source Port: | 35360 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2398.154.27.19439058802025883 11/01/23-15:43:45.091603 |
SID: | 2025883 |
Source Port: | 39058 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2324.33.78.554117875472023548 11/01/23-15:44:25.581137 |
SID: | 2023548 |
Source Port: | 41178 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23192.34.52.10545514802030092 11/01/23-15:44:11.098648 |
SID: | 2030092 |
Source Port: | 45514 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23172.248.68.1223721675472023548 11/01/23-15:43:22.187880 |
SID: | 2023548 |
Source Port: | 37216 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2399.251.200.485318075472023548 11/01/23-15:43:44.929796 |
SID: | 2023548 |
Source Port: | 53180 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2399.233.235.584245275472023548 11/01/23-15:44:17.758169 |
SID: | 2023548 |
Source Port: | 42452 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23216.212.29.1064578875472023548 11/01/23-15:43:16.361174 |
SID: | 2023548 |
Source Port: | 45788 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23104.112.129.15335680802025883 11/01/23-15:43:14.875089 |
SID: | 2025883 |
Source Port: | 35680 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2323.247.1.21437786802025883 11/01/23-15:44:15.201036 |
SID: | 2025883 |
Source Port: | 37786 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23177.242.209.1326081675472023548 11/01/23-15:44:44.967651 |
SID: | 2023548 |
Source Port: | 60816 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2347.13.197.1244942475472023548 11/01/23-15:44:40.462797 |
SID: | 2023548 |
Source Port: | 49424 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23137.135.131.14644532802030092 11/01/23-15:43:53.058315 |
SID: | 2030092 |
Source Port: | 44532 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23119.216.212.2333609875472023548 11/01/23-15:44:12.428806 |
SID: | 2023548 |
Source Port: | 36098 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2323.82.34.853884802030092 11/01/23-15:43:15.039125 |
SID: | 2030092 |
Source Port: | 53884 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2384.54.107.8451292802025883 11/01/23-15:43:45.279134 |
SID: | 2025883 |
Source Port: | 51292 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23201.213.236.175146075472023548 11/01/23-15:44:06.350178 |
SID: | 2023548 |
Source Port: | 51460 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23176.179.100.674968075472023548 11/01/23-15:43:51.091928 |
SID: | 2023548 |
Source Port: | 49680 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23104.106.224.3950180802025883 11/01/23-15:44:34.878174 |
SID: | 2025883 |
Source Port: | 50180 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23192.28.144.19044730802025576 11/01/23-15:43:48.060705 |
SID: | 2025576 |
Source Port: | 44730 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2314.40.223.1774332075472023548 11/01/23-15:44:30.609761 |
SID: | 2023548 |
Source Port: | 43320 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2385.150.142.1544604875472023548 11/01/23-15:43:22.200434 |
SID: | 2023548 |
Source Port: | 46048 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2375.141.67.14941896802030092 11/01/23-15:43:26.768774 |
SID: | 2030092 |
Source Port: | 41896 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2366.24.36.1943374275472023548 11/01/23-15:43:41.505154 |
SID: | 2023548 |
Source Port: | 33742 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2389.169.25.23152930802025883 11/01/23-15:44:10.010669 |
SID: | 2025883 |
Source Port: | 52930 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.232.189.158.345199075472023548 11/01/23-15:44:31.306051 |
SID: | 2023548 |
Source Port: | 51990 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23107.145.201.1114676875472023548 11/01/23-15:43:53.391474 |
SID: | 2023548 |
Source Port: | 46768 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2366.24.36.1943360275472023548 11/01/23-15:43:37.193758 |
SID: | 2023548 |
Source Port: | 33602 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2335.241.23.13241338528692027339 11/01/23-15:44:04.754355 |
SID: | 2027339 |
Source Port: | 41338 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23107.145.201.1114673875472023548 11/01/23-15:43:53.252343 |
SID: | 2023548 |
Source Port: | 46738 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23154.23.20.21440282802025883 11/01/23-15:43:45.038339 |
SID: | 2025883 |
Source Port: | 40282 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23106.39.170.23536420802030092 11/01/23-15:44:47.751257 |
SID: | 2030092 |
Source Port: | 36420 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.237.130.14056308802025883 11/01/23-15:44:44.104384 |
SID: | 2025883 |
Source Port: | 56308 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2314.45.26.1023322075472023548 11/01/23-15:43:23.335796 |
SID: | 2023548 |
Source Port: | 33220 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23125.131.156.1695643475472023548 11/01/23-15:43:37.657054 |
SID: | 2023548 |
Source Port: | 56434 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.232.143.194.273856675472023548 11/01/23-15:44:21.418080 |
SID: | 2023548 |
Source Port: | 38566 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2324.208.93.2523795675472023548 11/01/23-15:44:44.761457 |
SID: | 2023548 |
Source Port: | 37956 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23118.49.223.1644341075472023548 11/01/23-15:43:15.276215 |
SID: | 2023548 |
Source Port: | 43410 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23175.41.201.9341522802025883 11/01/23-15:43:16.345723 |
SID: | 2025883 |
Source Port: | 41522 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23156.254.132.21758498802030092 11/01/23-15:43:25.907178 |
SID: | 2030092 |
Source Port: | 58498 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23208.74.69.17850024802025883 11/01/23-15:44:15.041652 |
SID: | 2025883 |
Source Port: | 50024 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23192.107.142.566070675472023548 11/01/23-15:44:21.994040 |
SID: | 2023548 |
Source Port: | 60706 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2334.43.148.465601875472023548 11/01/23-15:43:15.087307 |
SID: | 2023548 |
Source Port: | 56018 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23143.137.229.3646836802030092 11/01/23-15:44:04.042510 |
SID: | 2030092 |
Source Port: | 46836 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23175.246.71.1996092475472023548 11/01/23-15:43:53.808853 |
SID: | 2023548 |
Source Port: | 60924 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23103.101.163.18044756802025576 11/01/23-15:43:38.896819 |
SID: | 2025576 |
Source Port: | 44756 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2359.28.97.1623352275472023548 11/01/23-15:44:48.807517 |
SID: | 2023548 |
Source Port: | 33522 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2338.207.89.14438294528692025132 11/01/23-15:43:45.348224 |
SID: | 2025132 |
Source Port: | 38294 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | Attempted User Privilege Gain |
Timestamp: | 192.168.2.2323.77.102.17134308802025576 11/01/23-15:43:39.193154 |
SID: | 2025576 |
Source Port: | 34308 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2382.177.126.1058416802025883 11/01/23-15:44:28.219017 |
SID: | 2025883 |
Source Port: | 58416 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2335.241.23.13241338528692025132 11/01/23-15:44:04.754355 |
SID: | 2025132 |
Source Port: | 41338 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | Attempted User Privilege Gain |
Timestamp: | 192.168.2.2366.6.171.2841502802025883 11/01/23-15:43:44.522020 |
SID: | 2025883 |
Source Port: | 41502 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23189.18.71.1133691275472023548 11/01/23-15:44:10.137099 |
SID: | 2023548 |
Source Port: | 36912 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2344.240.196.4134876802025883 11/01/23-15:44:37.189415 |
SID: | 2025883 |
Source Port: | 34876 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23200.148.45.1143637475472023548 11/01/23-15:43:27.259381 |
SID: | 2023548 |
Source Port: | 36374 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23181.167.46.1654506475472023548 11/01/23-15:44:12.675695 |
SID: | 2023548 |
Source Port: | 45064 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2347.35.76.9437272802025883 11/01/23-15:44:14.980583 |
SID: | 2025883 |
Source Port: | 37272 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2380.56.178.25147578802025883 11/01/23-15:43:44.934473 |
SID: | 2025883 |
Source Port: | 47578 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2323.198.187.8835006802025883 11/01/23-15:44:30.185079 |
SID: | 2025883 |
Source Port: | 35006 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23154.214.93.904310875472023548 11/01/23-15:43:36.418292 |
SID: | 2023548 |
Source Port: | 43108 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23202.188.238.4253092802030092 11/01/23-15:44:15.205636 |
SID: | 2030092 |
Source Port: | 53092 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2386.185.86.2445002875472023548 11/01/23-15:44:21.309314 |
SID: | 2023548 |
Source Port: | 50028 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2350.38.90.1176001075472023548 11/01/23-15:44:33.925852 |
SID: | 2023548 |
Source Port: | 60010 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23181.4.134.524698275472023548 11/01/23-15:44:34.270571 |
SID: | 2023548 |
Source Port: | 46982 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2383.164.11.20050570802025883 11/01/23-15:44:11.290150 |
SID: | 2025883 |
Source Port: | 50570 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23184.88.168.2105746475472023548 11/01/23-15:44:17.765449 |
SID: | 2023548 |
Source Port: | 57464 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2392.40.144.2205152275472023548 11/01/23-15:44:45.404023 |
SID: | 2023548 |
Source Port: | 51522 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23172.67.165.10348114802025883 11/01/23-15:44:45.316521 |
SID: | 2025883 |
Source Port: | 48114 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23139.9.34.20148536802025883 11/01/23-15:43:54.161921 |
SID: | 2025883 |
Source Port: | 48536 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2382.146.56.13952488802025883 11/01/23-15:44:01.297915 |
SID: | 2025883 |
Source Port: | 52488 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2350.51.255.384728675472023548 11/01/23-15:44:02.045512 |
SID: | 2023548 |
Source Port: | 47286 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23186.139.111.2484983475472023548 11/01/23-15:44:11.865105 |
SID: | 2023548 |
Source Port: | 49834 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2338.207.89.14438294528692027339 11/01/23-15:43:45.348224 |
SID: | 2027339 |
Source Port: | 38294 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2314.95.236.334398675472023548 11/01/23-15:43:16.269206 |
SID: | 2023548 |
Source Port: | 43986 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2395.101.169.3554266802025883 11/01/23-15:43:34.940649 |
SID: | 2025883 |
Source Port: | 54266 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23211.106.9.183700675472023548 11/01/23-15:43:36.407932 |
SID: | 2023548 |
Source Port: | 37006 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23192.34.52.10545464802030092 11/01/23-15:44:10.106213 |
SID: | 2030092 |
Source Port: | 45464 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2354.199.122.23745452802030092 11/01/23-15:44:51.055763 |
SID: | 2030092 |
Source Port: | 45452 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.254.132.21758478802030092 11/01/23-15:43:26.895267 |
SID: | 2030092 |
Source Port: | 58478 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.253.46.16938730528692027339 11/01/23-15:43:59.163739 |
SID: | 2027339 |
Source Port: | 38730 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2363.134.240.6735040802025576 11/01/23-15:43:19.489318 |
SID: | 2025576 |
Source Port: | 35040 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23175.201.244.14165875472023548 11/01/23-15:44:29.411521 |
SID: | 2023548 |
Source Port: | 41658 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2366.129.112.11758236802025883 11/01/23-15:44:26.658437 |
SID: | 2025883 |
Source Port: | 58236 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23192.107.142.566069475472023548 11/01/23-15:44:20.834042 |
SID: | 2023548 |
Source Port: | 60694 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2347.104.251.25045678802025883 11/01/23-15:43:15.111790 |
SID: | 2025883 |
Source Port: | 45678 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23192.185.109.7834790802030092 11/01/23-15:44:51.904798 |
SID: | 2030092 |
Source Port: | 34790 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2399.233.235.584250075472023548 11/01/23-15:44:20.952164 |
SID: | 2023548 |
Source Port: | 42500 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23118.148.54.965478675472023548 11/01/23-15:43:16.825856 |
SID: | 2023548 |
Source Port: | 54786 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23154.210.53.8548836802030092 11/01/23-15:44:40.252750 |
SID: | 2030092 |
Source Port: | 48836 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.1.191.2837322802030092 11/01/23-15:44:40.509118 |
SID: | 2030092 |
Source Port: | 37322 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2314.40.253.755391475472023548 11/01/23-15:44:22.819491 |
SID: | 2023548 |
Source Port: | 53914 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.235.154.236.1558456802030092 11/01/23-15:43:40.180738 |
SID: | 2030092 |
Source Port: | 58456 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.1.211.6549912802030092 11/01/23-15:43:54.841956 |
SID: | 2030092 |
Source Port: | 49912 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23190.247.215.1734221275472023548 11/01/23-15:44:21.949732 |
SID: | 2023548 |
Source Port: | 42212 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23190.92.132.21956348802025883 11/01/23-15:44:30.310522 |
SID: | 2025883 |
Source Port: | 56348 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23177.140.197.1404122275472023548 11/01/23-15:44:13.236735 |
SID: | 2023548 |
Source Port: | 41222 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23104.16.216.17535082802030092 11/01/23-15:44:14.951462 |
SID: | 2030092 |
Source Port: | 35082 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2371.9.136.21557902802025883 11/01/23-15:42:55.394072 |
SID: | 2025883 |
Source Port: | 57902 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23184.27.26.9957708802025883 11/01/23-15:43:29.249592 |
SID: | 2025883 |
Source Port: | 57708 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2347.104.251.25045662802025883 11/01/23-15:43:15.094315 |
SID: | 2025883 |
Source Port: | 45662 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2399.251.200.485318875472023548 11/01/23-15:43:45.070981 |
SID: | 2023548 |
Source Port: | 53188 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2383.167.111.1894740875472023548 11/01/23-15:44:12.354384 |
SID: | 2023548 |
Source Port: | 47408 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2359.14.37.1785308475472023548 11/01/23-15:43:30.603569 |
SID: | 2023548 |
Source Port: | 53084 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23139.162.1.18244790802030092 11/01/23-15:43:33.386707 |
SID: | 2030092 |
Source Port: | 44790 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2335.244.139.10644356802030092 11/01/23-15:43:29.250017 |
SID: | 2030092 |
Source Port: | 44356 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23116.206.52.19938532528692025132 11/01/23-15:43:40.976716 |
SID: | 2025132 |
Source Port: | 38532 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | Attempted User Privilege Gain |
Timestamp: | 192.168.2.23162.55.37.3058302802030092 11/01/23-15:43:31.966092 |
SID: | 2030092 |
Source Port: | 58302 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2366.96.231.1605201675472023548 11/01/23-15:44:31.405883 |
SID: | 2023548 |
Source Port: | 52016 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23162.159.10.13151090802030092 11/01/23-15:43:40.992005 |
SID: | 2030092 |
Source Port: | 51090 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23177.144.179.2034419675472023548 11/01/23-15:44:23.166523 |
SID: | 2023548 |
Source Port: | 44196 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23204.188.232.10549852802030092 11/01/23-15:44:01.083001 |
SID: | 2030092 |
Source Port: | 49852 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2350.37.182.2045508475472023548 11/01/23-15:43:37.994905 |
SID: | 2023548 |
Source Port: | 55084 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23154.114.19.11344734802025576 11/01/23-15:43:39.829361 |
SID: | 2025576 |
Source Port: | 44734 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23185.44.64.6160990802030092 11/01/23-15:43:55.496998 |
SID: | 2030092 |
Source Port: | 60990 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23113.198.60.6456940802030092 11/01/23-15:44:35.421779 |
SID: | 2030092 |
Source Port: | 56940 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23118.180.32.3140052802025883 11/01/23-15:44:34.368596 |
SID: | 2025883 |
Source Port: | 40052 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23178.37.118.2094679675472023548 11/01/23-15:44:10.765975 |
SID: | 2023548 |
Source Port: | 46796 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2318.214.219.24352072802025576 11/01/23-15:43:16.681285 |
SID: | 2025576 |
Source Port: | 52072 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23139.130.118.1455298075472023548 11/01/23-15:43:37.286115 |
SID: | 2023548 |
Source Port: | 52980 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2350.124.59.1884672275472023548 11/01/23-15:44:20.817951 |
SID: | 2023548 |
Source Port: | 46722 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2323.40.1.20437586802025576 11/01/23-15:43:39.998152 |
SID: | 2025576 |
Source Port: | 37586 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2394.242.177.1333587875472023548 11/01/23-15:44:10.356946 |
SID: | 2023548 |
Source Port: | 35878 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23118.57.64.1715462275472023548 11/01/23-15:43:42.278207 |
SID: | 2023548 |
Source Port: | 54622 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23189.110.150.774230075472023548 11/01/23-15:43:55.206794 |
SID: | 2023548 |
Source Port: | 42300 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23112.177.225.395227475472023548 11/01/23-15:43:26.884178 |
SID: | 2023548 |
Source Port: | 52274 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23104.92.252.11451750802025576 11/01/23-15:43:28.031872 |
SID: | 2025576 |
Source Port: | 51750 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23112.165.68.1275424875472023548 11/01/23-15:43:45.097801 |
SID: | 2023548 |
Source Port: | 54248 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2386.110.96.8343266802025883 11/01/23-15:44:10.995362 |
SID: | 2025883 |
Source Port: | 43266 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23190.200.135.11438898802030092 11/01/23-15:43:44.623953 |
SID: | 2030092 |
Source Port: | 38898 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23212.74.182.7941512802030092 11/01/23-15:44:18.581953 |
SID: | 2030092 |
Source Port: | 41512 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23195.178.134.656240802030092 11/01/23-15:43:26.765197 |
SID: | 2030092 |
Source Port: | 56240 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.254.132.21759000802030092 11/01/23-15:43:39.983650 |
SID: | 2030092 |
Source Port: | 59000 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2318.213.226.8539516802025576 11/01/23-15:43:39.646946 |
SID: | 2025576 |
Source Port: | 39516 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2365.78.184.4053024802030092 11/01/23-15:43:58.890598 |
SID: | 2030092 |
Source Port: | 53024 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.254.71.14658156528692027339 11/01/23-15:44:33.259802 |
SID: | 2027339 |
Source Port: | 58156 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23178.252.26.25360764802025883 11/01/23-15:43:15.849656 |
SID: | 2025883 |
Source Port: | 60764 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2314.85.63.1415587275472023548 11/01/23-15:44:13.300790 |
SID: | 2023548 |
Source Port: | 55872 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23107.148.181.19758584802025883 11/01/23-15:43:44.566862 |
SID: | 2025883 |
Source Port: | 58584 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23196.51.48.12640078802030092 11/01/23-15:43:26.756079 |
SID: | 2030092 |
Source Port: | 40078 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2350.109.83.2394220675472023548 11/01/23-15:44:40.524726 |
SID: | 2023548 |
Source Port: | 42206 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23201.227.129.1733959075472023548 11/01/23-15:44:49.366368 |
SID: | 2023548 |
Source Port: | 39590 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23112.169.118.1285695875472023548 11/01/23-15:44:12.423714 |
SID: | 2023548 |
Source Port: | 56958 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23156.254.132.21758554802030092 11/01/23-15:43:28.047630 |
SID: | 2030092 |
Source Port: | 58554 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2354.86.11.5451700802030092 11/01/23-15:43:56.211770 |
SID: | 2030092 |
Source Port: | 51700 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23186.152.222.915625875472023548 11/01/23-15:44:40.776184 |
SID: | 2023548 |
Source Port: | 56258 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23156.226.79.7754574802030092 11/01/23-15:44:40.236437 |
SID: | 2030092 |
Source Port: | 54574 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23193.119.111.2096078475472023548 11/01/23-15:43:37.407331 |
SID: | 2023548 |
Source Port: | 60784 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2386.110.96.8343266802030092 11/01/23-15:44:10.995362 |
SID: | 2030092 |
Source Port: | 43266 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23119.209.116.736049075472023548 11/01/23-15:43:27.638910 |
SID: | 2023548 |
Source Port: | 60490 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23192.185.111.2637004802025883 11/01/23-15:43:16.338944 |
SID: | 2025883 |
Source Port: | 37004 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23186.22.34.1055336475472023548 11/01/23-15:44:25.592049 |
SID: | 2023548 |
Source Port: | 53364 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23119.209.254.2454511475472023548 11/01/23-15:44:34.049591 |
SID: | 2023548 |
Source Port: | 45114 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2366.198.249.3355844802025576 11/01/23-15:43:38.969824 |
SID: | 2025576 |
Source Port: | 55844 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2347.108.38.7548452802030092 11/01/23-15:43:59.496571 |
SID: | 2030092 |
Source Port: | 48452 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23172.82.174.7352798802025883 11/01/23-15:43:32.120603 |
SID: | 2025883 |
Source Port: | 52798 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2339.34.223.1113743075472023548 11/01/23-15:44:22.820211 |
SID: | 2023548 |
Source Port: | 37430 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23211.198.1.183684875472023548 11/01/23-15:43:15.274342 |
SID: | 2023548 |
Source Port: | 36848 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2350.37.182.2045497875472023548 11/01/23-15:43:36.809635 |
SID: | 2023548 |
Source Port: | 54978 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2350.114.162.2052676802025883 11/01/23-15:44:51.177699 |
SID: | 2025883 |
Source Port: | 52676 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2352.14.151.15049296802030092 11/01/23-15:44:25.319729 |
SID: | 2030092 |
Source Port: | 49296 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2347.135.248.444148802025883 11/01/23-15:43:14.789209 |
SID: | 2025883 |
Source Port: | 44148 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2339.109.34.23050326802030092 11/01/23-15:43:18.946410 |
SID: | 2030092 |
Source Port: | 50326 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23217.21.78.12360746802030092 11/01/23-15:43:54.163753 |
SID: | 2030092 |
Source Port: | 60746 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23189.68.95.1525059075472023548 11/01/23-15:43:31.453801 |
SID: | 2023548 |
Source Port: | 50590 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2334.111.150.16652092802030092 11/01/23-15:44:04.173283 |
SID: | 2030092 |
Source Port: | 52092 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.4.130.14757326802025576 11/01/23-15:43:44.257058 |
SID: | 2025576 |
Source Port: | 57326 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2366.129.112.11758312802030092 11/01/23-15:44:30.044424 |
SID: | 2030092 |
Source Port: | 58312 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2388.126.78.17538908802030092 11/01/23-15:43:15.051321 |
SID: | 2030092 |
Source Port: | 38908 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23202.188.238.4253110802030092 11/01/23-15:44:16.198452 |
SID: | 2030092 |
Source Port: | 53110 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23181.4.134.524693475472023548 11/01/23-15:44:33.583414 |
SID: | 2023548 |
Source Port: | 46934 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23175.246.71.1996093275472023548 11/01/23-15:43:54.109790 |
SID: | 2023548 |
Source Port: | 60932 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23114.30.157.1695051075472023548 11/01/23-15:43:23.640336 |
SID: | 2023548 |
Source Port: | 50510 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23198.37.56.12158712802030092 11/01/23-15:43:21.139500 |
SID: | 2030092 |
Source Port: | 58712 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23141.179.18.523881475472023548 11/01/23-15:43:41.268264 |
SID: | 2023548 |
Source Port: | 38814 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2371.76.247.1135169875472023548 11/01/23-15:44:40.602465 |
SID: | 2023548 |
Source Port: | 51698 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2393.112.184.1813282675472023548 11/01/23-15:43:31.181450 |
SID: | 2023548 |
Source Port: | 32826 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23184.29.214.19550412802025883 11/01/23-15:43:21.434670 |
SID: | 2025883 |
Source Port: | 50412 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2350.110.194.1585233475472023548 11/01/23-15:43:17.314618 |
SID: | 2023548 |
Source Port: | 52334 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23104.69.85.2535744802030092 11/01/23-15:43:32.936745 |
SID: | 2030092 |
Source Port: | 35744 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2376.177.200.234513475472023548 11/01/23-15:44:34.262796 |
SID: | 2023548 |
Source Port: | 45134 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2313.42.174.7355216802025883 11/01/23-15:43:40.026689 |
SID: | 2025883 |
Source Port: | 55216 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2323.253.138.24160074802030092 11/01/23-15:43:51.896801 |
SID: | 2030092 |
Source Port: | 60074 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2334.111.80.5544876802025576 11/01/23-15:42:57.044392 |
SID: | 2025576 |
Source Port: | 44876 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23109.145.115.6546510802025883 11/01/23-15:44:11.273354 |
SID: | 2025883 |
Source Port: | 46510 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23120.88.174.1335886675472023548 11/01/23-15:43:22.509880 |
SID: | 2023548 |
Source Port: | 58866 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23107.162.149.14743780802030092 11/01/23-15:42:54.072804 |
SID: | 2030092 |
Source Port: | 43780 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2389.169.25.23152930802030092 11/01/23-15:44:10.010669 |
SID: | 2030092 |
Source Port: | 52930 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2399.251.232.1654880675472023548 11/01/23-15:44:18.026774 |
SID: | 2023548 |
Source Port: | 48806 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23118.49.194.925124875472023548 11/01/23-15:43:35.942514 |
SID: | 2023548 |
Source Port: | 51248 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23104.94.119.12237562802030092 11/01/23-15:44:37.103573 |
SID: | 2030092 |
Source Port: | 37562 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23203.77.200.13156696802030092 11/01/23-15:44:28.567847 |
SID: | 2030092 |
Source Port: | 56696 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23174.100.30.15656142802025883 11/01/23-15:44:07.589480 |
SID: | 2025883 |
Source Port: | 56142 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2314.95.236.334391675472023548 11/01/23-15:43:15.976010 |
SID: | 2023548 |
Source Port: | 43916 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2324.33.78.554117675472023548 11/01/23-15:44:25.448707 |
SID: | 2023548 |
Source Port: | 41176 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2318.197.134.14658710802025883 11/01/23-15:44:37.188831 |
SID: | 2025883 |
Source Port: | 58710 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2388.120.116.149848802030092 11/01/23-15:44:51.138611 |
SID: | 2030092 |
Source Port: | 49848 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23139.9.34.20148536802030092 11/01/23-15:43:54.161921 |
SID: | 2030092 |
Source Port: | 48536 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23107.21.194.5848014802030092 11/01/23-15:44:30.136710 |
SID: | 2030092 |
Source Port: | 48014 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23172.66.193.6960218802025883 11/01/23-15:43:49.771068 |
SID: | 2025883 |
Source Port: | 60218 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2323.198.187.8835006802030092 11/01/23-15:44:30.185079 |
SID: | 2030092 |
Source Port: | 35006 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2335.190.10.18853306802030092 11/01/23-15:44:12.111557 |
SID: | 2030092 |
Source Port: | 53306 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2385.152.162.15548414802025576 11/01/23-15:43:38.735911 |
SID: | 2025576 |
Source Port: | 48414 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23154.93.162.8549688802030092 11/01/23-15:43:40.972537 |
SID: | 2030092 |
Source Port: | 49688 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2389.137.46.9352342802030092 11/01/23-15:43:16.479338 |
SID: | 2030092 |
Source Port: | 52342 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2398.154.27.19439058802030092 11/01/23-15:43:45.091603 |
SID: | 2030092 |
Source Port: | 39058 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23202.188.238.4253092802025883 11/01/23-15:44:15.205636 |
SID: | 2025883 |
Source Port: | 53092 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23121.187.125.1585918075472023548 11/01/23-15:44:18.673331 |
SID: | 2023548 |
Source Port: | 59180 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23181.167.46.1654504675472023548 11/01/23-15:44:12.404675 |
SID: | 2023548 |
Source Port: | 45046 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2386.140.139.1114881675472023548 11/01/23-15:43:30.129050 |
SID: | 2023548 |
Source Port: | 48816 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2352.32.118.6238012802025883 11/01/23-15:44:26.377079 |
SID: | 2025883 |
Source Port: | 38012 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2314.40.139.1673961275472023548 11/01/23-15:44:31.613761 |
SID: | 2023548 |
Source Port: | 39612 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23104.25.53.5757894802025883 11/01/23-15:44:14.965920 |
SID: | 2025883 |
Source Port: | 57894 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23104.106.224.3950180802030092 11/01/23-15:44:34.878174 |
SID: | 2030092 |
Source Port: | 50180 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2383.164.11.20050570802030092 11/01/23-15:44:11.290150 |
SID: | 2030092 |
Source Port: | 50570 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2389.100.213.1483554675472023548 11/01/23-15:44:30.495458 |
SID: | 2023548 |
Source Port: | 35546 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2384.54.107.8451292802030092 11/01/23-15:43:45.279134 |
SID: | 2030092 |
Source Port: | 51292 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.82.13.11150916802025883 11/01/23-15:44:50.869732 |
SID: | 2025883 |
Source Port: | 50916 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23176.179.100.674964275472023548 11/01/23-15:43:49.898880 |
SID: | 2023548 |
Source Port: | 49642 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2350.118.170.5360610802025883 11/01/23-15:44:10.161440 |
SID: | 2025883 |
Source Port: | 60610 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2394.71.148.173886075472023548 11/01/23-15:43:36.118743 |
SID: | 2023548 |
Source Port: | 38860 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2352.216.229.5448444802025576 11/01/23-15:43:44.862468 |
SID: | 2025576 |
Source Port: | 48444 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23116.74.150.1833439275472023548 11/01/23-15:43:24.244574 |
SID: | 2023548 |
Source Port: | 34392 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23118.49.194.925126475472023548 11/01/23-15:43:36.235735 |
SID: | 2023548 |
Source Port: | 51264 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23101.51.163.1843337675472023548 11/01/23-15:44:41.059235 |
SID: | 2023548 |
Source Port: | 33376 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2346.4.54.6846674802025576 11/01/23-15:43:17.207134 |
SID: | 2025576 |
Source Port: | 46674 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2361.77.250.22340654802030092 11/01/23-15:43:32.397777 |
SID: | 2030092 |
Source Port: | 40654 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.59.221.20345048802030092 11/01/23-15:43:32.909511 |
SID: | 2030092 |
Source Port: | 45048 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23174.115.90.224036075472023548 11/01/23-15:43:38.942808 |
SID: | 2023548 |
Source Port: | 40360 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23118.53.39.143939275472023548 11/01/23-15:43:30.244964 |
SID: | 2023548 |
Source Port: | 39392 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23207.60.142.14749694802030092 11/01/23-15:44:11.268225 |
SID: | 2030092 |
Source Port: | 49694 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23102.218.241.20349832802025883 11/01/23-15:44:34.984348 |
SID: | 2025883 |
Source Port: | 49832 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23144.91.114.20147250802030092 11/01/23-15:44:10.179577 |
SID: | 2030092 |
Source Port: | 47250 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2350.124.59.1884673275472023548 11/01/23-15:44:20.953406 |
SID: | 2023548 |
Source Port: | 46732 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23125.131.156.1695642075472023548 11/01/23-15:43:37.364887 |
SID: | 2023548 |
Source Port: | 56420 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23208.106.198.22841118802025883 11/01/23-15:44:07.608147 |
SID: | 2025883 |
Source Port: | 41118 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2313.228.195.11340050802030092 11/01/23-15:44:21.548206 |
SID: | 2030092 |
Source Port: | 40050 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.254.132.21758706802030092 11/01/23-15:43:31.793646 |
SID: | 2030092 |
Source Port: | 58706 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23118.172.31.2005496475472023548 11/01/23-15:44:31.688317 |
SID: | 2023548 |
Source Port: | 54964 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23104.17.27.17843650802025883 11/01/23-15:43:58.639788 |
SID: | 2025883 |
Source Port: | 43650 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.232.19.15.22748156802025883 11/01/23-15:44:33.856980 |
SID: | 2025883 |
Source Port: | 48156 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2350.2.178.18636822802030092 11/01/23-15:44:04.174582 |
SID: | 2030092 |
Source Port: | 36822 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23181.29.44.1503894675472023548 11/01/23-15:43:59.992419 |
SID: | 2023548 |
Source Port: | 38946 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2380.244.186.24139402802025883 11/01/23-15:44:33.827447 |
SID: | 2025883 |
Source Port: | 39402 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23123.12.214.1135832802025576 11/01/23-15:43:16.582655 |
SID: | 2025576 |
Source Port: | 35832 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23154.60.110.595220275472023548 11/01/23-15:43:22.250044 |
SID: | 2023548 |
Source Port: | 52202 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23189.230.144.1226088275472023548 11/01/23-15:43:14.919931 |
SID: | 2023548 |
Source Port: | 60882 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23181.29.44.1503892675472023548 11/01/23-15:43:59.718609 |
SID: | 2023548 |
Source Port: | 38926 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2352.34.96.2842592802030092 11/01/23-15:43:45.116691 |
SID: | 2030092 |
Source Port: | 42592 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23125.149.19.895795675472023548 11/01/23-15:43:31.312124 |
SID: | 2023548 |
Source Port: | 57956 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23118.60.120.1473395275472023548 11/01/23-15:42:58.604042 |
SID: | 2023548 |
Source Port: | 33952 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2369.207.206.773427475472023548 11/01/23-15:43:26.399805 |
SID: | 2023548 |
Source Port: | 34274 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2324.93.20.593281275472023548 11/01/23-15:43:54.978389 |
SID: | 2023548 |
Source Port: | 32812 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23112.186.138.135290075472023548 11/01/23-15:44:30.932243 |
SID: | 2023548 |
Source Port: | 52900 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2339.110.149.993596275472023548 11/01/23-15:44:09.884239 |
SID: | 2023548 |
Source Port: | 35962 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23154.223.116.22038168802030092 11/01/23-15:44:51.962413 |
SID: | 2030092 |
Source Port: | 38168 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2399.233.235.584247275472023548 11/01/23-15:44:17.911095 |
SID: | 2023548 |
Source Port: | 42472 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23146.88.90.23135640802025576 11/01/23-15:43:40.546492 |
SID: | 2025576 |
Source Port: | 35640 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23203.255.95.16355546802030092 11/01/23-15:44:18.685963 |
SID: | 2030092 |
Source Port: | 55546 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.251.133.5242710802030092 11/01/23-15:43:26.744591 |
SID: | 2030092 |
Source Port: | 42710 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.241.112.18452506528692027339 11/01/23-15:44:53.428092 |
SID: | 2027339 |
Source Port: | 52506 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2323.217.247.11657402802025576 11/01/23-15:43:17.451037 |
SID: | 2025576 |
Source Port: | 57402 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23104.96.253.10558440802030092 11/01/23-15:44:07.553193 |
SID: | 2030092 |
Source Port: | 58440 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2345.87.235.6346444802025883 11/01/23-15:44:15.187456 |
SID: | 2025883 |
Source Port: | 46444 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2323.39.119.19246520802030092 11/01/23-15:44:16.832564 |
SID: | 2030092 |
Source Port: | 46520 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2354.145.45.12558556802025883 11/01/23-15:44:18.462067 |
SID: | 2025883 |
Source Port: | 58556 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2369.193.220.21845966802025576 11/01/23-15:43:17.380121 |
SID: | 2025576 |
Source Port: | 45966 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23118.208.197.404824075472023548 11/01/23-15:44:37.741695 |
SID: | 2023548 |
Source Port: | 48240 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23181.167.65.305799675472023548 11/01/23-15:44:07.384261 |
SID: | 2023548 |
Source Port: | 57996 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23118.172.31.2005493875472023548 11/01/23-15:44:31.074828 |
SID: | 2023548 |
Source Port: | 54938 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2393.112.184.1813287275472023548 11/01/23-15:43:31.418562 |
SID: | 2023548 |
Source Port: | 32872 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23174.84.11.5346416802030092 11/01/23-15:44:03.959353 |
SID: | 2030092 |
Source Port: | 46416 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2366.24.36.1943373275472023548 11/01/23-15:43:41.386637 |
SID: | 2023548 |
Source Port: | 33732 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2313.125.106.17755622802030092 11/01/23-15:44:41.417009 |
SID: | 2030092 |
Source Port: | 55622 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23116.82.151.1944661275472023548 11/01/23-15:44:39.916718 |
SID: | 2023548 |
Source Port: | 46612 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.238.142.79.9246910802030092 11/01/23-15:43:26.913044 |
SID: | 2030092 |
Source Port: | 46910 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23149.30.169.17834382802030092 11/01/23-15:43:35.046708 |
SID: | 2030092 |
Source Port: | 34382 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23149.0.169.1344865075472023548 11/01/23-15:44:47.129655 |
SID: | 2023548 |
Source Port: | 48650 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23107.23.224.23142302802030092 11/01/23-15:44:51.891694 |
SID: | 2030092 |
Source Port: | 42302 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23109.157.108.935979475472023548 11/01/23-15:43:17.084159 |
SID: | 2023548 |
Source Port: | 59794 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23197.205.37.165939275472023548 11/01/23-15:44:09.102863 |
SID: | 2023548 |
Source Port: | 59392 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2338.100.221.15739772802025883 11/01/23-15:44:49.966704 |
SID: | 2025883 |
Source Port: | 39772 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2314.90.246.325602875472023548 11/01/23-15:43:15.559565 |
SID: | 2023548 |
Source Port: | 56028 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23197.205.37.165938275472023548 11/01/23-15:44:06.050498 |
SID: | 2023548 |
Source Port: | 59382 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2395.84.7.2425515275472023548 11/01/23-15:43:36.348228 |
SID: | 2023548 |
Source Port: | 55152 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23182.16.26.14654158802025576 11/01/23-15:43:40.159422 |
SID: | 2025576 |
Source Port: | 54158 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2388.157.102.11560062802025883 11/01/23-15:44:17.188333 |
SID: | 2025883 |
Source Port: | 60062 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23146.190.156.20253322802030092 11/01/23-15:43:58.903404 |
SID: | 2030092 |
Source Port: | 53322 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2335.165.194.8654914802025883 11/01/23-15:44:12.187665 |
SID: | 2025883 |
Source Port: | 54914 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2375.119.185.16451896802025883 11/01/23-15:44:37.114040 |
SID: | 2025883 |
Source Port: | 51896 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2352.142.41.25549986802025576 11/01/23-15:43:34.209655 |
SID: | 2025576 |
Source Port: | 49986 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2391.209.94.20253388802030092 11/01/23-15:44:43.221615 |
SID: | 2030092 |
Source Port: | 53388 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23189.110.150.774230675472023548 11/01/23-15:43:55.433442 |
SID: | 2023548 |
Source Port: | 42306 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2344.215.46.24235158802030092 11/01/23-15:44:04.134912 |
SID: | 2030092 |
Source Port: | 35158 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23220.244.65.615842075472023548 11/01/23-15:44:40.555549 |
SID: | 2023548 |
Source Port: | 58420 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23201.227.129.1733959475472023548 11/01/23-15:44:49.530694 |
SID: | 2023548 |
Source Port: | 39594 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2318.160.19.19634152802030092 11/01/23-15:44:10.882711 |
SID: | 2030092 |
Source Port: | 34152 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.134.94.11141606802025883 11/01/23-15:42:54.299151 |
SID: | 2025883 |
Source Port: | 41606 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2371.71.237.194848875472023548 11/01/23-15:43:27.401653 |
SID: | 2023548 |
Source Port: | 48488 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23118.54.97.545261675472023548 11/01/23-15:43:49.607300 |
SID: | 2023548 |
Source Port: | 52616 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23122.201.101.20252660802025883 11/01/23-15:43:35.347447 |
SID: | 2025883 |
Source Port: | 52660 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23104.106.244.9139796802025883 11/01/23-15:44:33.755161 |
SID: | 2025883 |
Source Port: | 39796 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23221.152.185.2503758875472023548 11/01/23-15:44:02.490635 |
SID: | 2023548 |
Source Port: | 37588 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2372.227.96.563571275472023548 11/01/23-15:44:40.625359 |
SID: | 2023548 |
Source Port: | 35712 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23121.176.255.275377075472023548 11/01/23-15:43:27.172438 |
SID: | 2023548 |
Source Port: | 53770 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23156.235.99.16735718528692027339 11/01/23-15:44:42.453637 |
SID: | 2027339 |
Source Port: | 35718 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23104.64.123.11358146802025883 11/01/23-15:43:27.934269 |
SID: | 2025883 |
Source Port: | 58146 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23116.74.150.1833438875472023548 11/01/23-15:43:22.871412 |
SID: | 2023548 |
Source Port: | 34388 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2361.83.227.1214535675472023548 11/01/23-15:43:54.844465 |
SID: | 2023548 |
Source Port: | 45356 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2323.59.221.20345074802030092 11/01/23-15:43:32.208053 |
SID: | 2030092 |
Source Port: | 45074 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.233.110.238.1543800802025576 11/01/23-15:43:35.518236 |
SID: | 2025576 |
Source Port: | 43800 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23216.247.161.8156882802030092 11/01/23-15:44:15.058435 |
SID: | 2030092 |
Source Port: | 56882 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2361.81.152.1516049675472023548 11/01/23-15:43:41.869207 |
SID: | 2023548 |
Source Port: | 60496 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23209.89.148.5537046802030092 11/01/23-15:43:39.860301 |
SID: | 2030092 |
Source Port: | 37046 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23189.41.238.1654900675472023548 11/01/23-15:44:40.672563 |
SID: | 2023548 |
Source Port: | 49006 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2323.82.173.7033700802025883 11/01/23-15:43:55.496773 |
SID: | 2025883 |
Source Port: | 33700 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23104.27.24.6556258802025883 11/01/23-15:44:37.103323 |
SID: | 2025883 |
Source Port: | 56258 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2327.235.187.996008475472023548 11/01/23-15:43:41.863389 |
SID: | 2023548 |
Source Port: | 60084 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2352.85.171.1939240802025883 11/01/23-15:44:07.460968 |
SID: | 2025883 |
Source Port: | 39240 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23213.176.252.2144780075472023548 11/01/23-15:44:22.399056 |
SID: | 2023548 |
Source Port: | 47800 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23156.226.79.7754654802025883 11/01/23-15:44:43.108213 |
SID: | 2025883 |
Source Port: | 54654 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23184.51.71.9744974802025883 11/01/23-15:44:36.720914 |
SID: | 2025883 |
Source Port: | 44974 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23186.22.34.1055352875472023548 11/01/23-15:44:31.575193 |
SID: | 2023548 |
Source Port: | 53528 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23156.253.45.8060998528692027339 11/01/23-15:44:53.428095 |
SID: | 2027339 |
Source Port: | 60998 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23189.68.95.1525057475472023548 11/01/23-15:43:31.233209 |
SID: | 2023548 |
Source Port: | 50574 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2347.96.103.9150760802030092 11/01/23-15:44:10.468022 |
SID: | 2030092 |
Source Port: | 50760 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2318.183.11.1354790802025576 11/01/23-15:43:48.243455 |
SID: | 2025576 |
Source Port: | 54790 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23118.148.54.965476675472023548 11/01/23-15:43:16.521176 |
SID: | 2023548 |
Source Port: | 54766 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2385.187.182.13843624802030092 11/01/23-15:44:18.576431 |
SID: | 2030092 |
Source Port: | 43624 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2324.212.171.1804142675472023548 11/01/23-15:44:00.116667 |
SID: | 2023548 |
Source Port: | 41426 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23201.213.236.175144875472023548 11/01/23-15:44:06.097623 |
SID: | 2023548 |
Source Port: | 51448 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2338.31.141.25447278802025576 11/01/23-15:42:57.084423 |
SID: | 2025576 |
Source Port: | 47278 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2314.40.139.1673959675472023548 11/01/23-15:44:31.312480 |
SID: | 2023548 |
Source Port: | 39596 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23216.212.29.1064580075472023548 11/01/23-15:43:16.481191 |
SID: | 2023548 |
Source Port: | 45800 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2352.154.158.8645488802030092 11/01/23-15:44:16.756192 |
SID: | 2030092 |
Source Port: | 45488 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2375.147.83.7749560802025883 11/01/23-15:44:52.125546 |
SID: | 2025883 |
Source Port: | 49560 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2323.203.100.5135698802030092 11/01/23-15:44:49.882365 |
SID: | 2030092 |
Source Port: | 35698 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2383.167.111.1894769675472023548 11/01/23-15:44:21.521230 |
SID: | 2023548 |
Source Port: | 47696 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23192.174.72.1242996802030092 11/01/23-15:44:07.590942 |
SID: | 2030092 |
Source Port: | 42996 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2351.38.23.9139998802025883 11/01/23-15:44:20.193829 |
SID: | 2025883 |
Source Port: | 39998 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2347.13.197.1244941075472023548 11/01/23-15:44:40.330721 |
SID: | 2023548 |
Source Port: | 49410 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23216.152.2.18549432802030092 11/01/23-15:44:11.097806 |
SID: | 2030092 |
Source Port: | 49432 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23146.71.37.17651718802030092 11/01/23-15:42:54.130098 |
SID: | 2030092 |
Source Port: | 51718 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23201.205.178.945411075472023548 11/01/23-15:43:14.858358 |
SID: | 2023548 |
Source Port: | 54110 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23175.250.160.953637475472023548 11/01/23-15:43:59.756371 |
SID: | 2023548 |
Source Port: | 36374 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2369.207.206.773437075472023548 11/01/23-15:43:27.518372 |
SID: | 2023548 |
Source Port: | 34370 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23139.9.34.20148504802025883 11/01/23-15:43:53.002253 |
SID: | 2025883 |
Source Port: | 48504 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2376.139.88.1714958875472023548 11/01/23-15:43:45.054984 |
SID: | 2023548 |
Source Port: | 49588 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2327.213.99.2065967875472023548 11/01/23-15:43:54.261455 |
SID: | 2023548 |
Source Port: | 59678 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23193.119.111.2096079875472023548 11/01/23-15:43:37.760005 |
SID: | 2023548 |
Source Port: | 60798 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.235.9.213.8260266802025576 11/01/23-15:43:16.779432 |
SID: | 2025576 |
Source Port: | 60266 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23184.31.75.13746190802030092 11/01/23-15:43:55.411439 |
SID: | 2030092 |
Source Port: | 46190 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2350.38.90.1176006875472023548 11/01/23-15:44:34.099409 |
SID: | 2023548 |
Source Port: | 60068 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23221.160.221.34291075472023548 11/01/23-15:44:34.351334 |
SID: | 2023548 |
Source Port: | 42910 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23156.254.95.15560354528692027339 11/01/23-15:43:37.815666 |
SID: | 2027339 |
Source Port: | 60354 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23118.57.64.1715466075472023548 11/01/23-15:43:42.572237 |
SID: | 2023548 |
Source Port: | 54660 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23184.15.117.149764802025883 11/01/23-15:43:58.665505 |
SID: | 2025883 |
Source Port: | 49764 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23191.252.203.11753550802030092 11/01/23-15:43:43.512641 |
SID: | 2030092 |
Source Port: | 53550 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23188.166.51.24940736802030092 11/01/23-15:43:39.859088 |
SID: | 2030092 |
Source Port: | 40736 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23188.31.235.2053442275472023548 11/01/23-15:44:07.028706 |
SID: | 2023548 |
Source Port: | 34422 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2388.252.38.704757275472023548 11/01/23-15:44:06.586364 |
SID: | 2023548 |
Source Port: | 47572 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2372.29.178.3842694802025883 11/01/23-15:44:17.173402 |
SID: | 2025883 |
Source Port: | 42694 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2338.165.96.3645176802025576 11/01/23-15:43:48.123248 |
SID: | 2025576 |
Source Port: | 45176 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23153.149.177.24640088802030092 11/01/23-15:44:27.935655 |
SID: | 2030092 |
Source Port: | 40088 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.235.166.166.1455062075472023548 11/01/23-15:43:49.957174 |
SID: | 2023548 |
Source Port: | 50620 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23174.115.90.224035075472023548 11/01/23-15:43:35.770189 |
SID: | 2023548 |
Source Port: | 40350 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2323.27.217.1245628802030092 11/01/23-15:44:34.929605 |
SID: | 2030092 |
Source Port: | 45628 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23115.20.180.1005541875472023548 11/01/23-15:43:49.610584 |
SID: | 2023548 |
Source Port: | 55418 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.235.166.166.1455066075472023548 11/01/23-15:43:50.187461 |
SID: | 2023548 |
Source Port: | 50660 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2386.162.31.2455223675472023548 11/01/23-15:44:07.878090 |
SID: | 2023548 |
Source Port: | 52236 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2369.146.26.433965675472023548 11/01/23-15:44:30.703593 |
SID: | 2023548 |
Source Port: | 39656 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2324.93.20.593282275472023548 11/01/23-15:43:55.113168 |
SID: | 2023548 |
Source Port: | 32822 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2334.43.148.465600075472023548 11/01/23-15:43:14.972554 |
SID: | 2023548 |
Source Port: | 56000 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23115.6.60.585085875472023548 11/01/23-15:43:37.689854 |
SID: | 2023548 |
Source Port: | 50858 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2399.242.239.553712275472023548 11/01/23-15:44:01.530471 |
SID: | 2023548 |
Source Port: | 37122 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2335.188.156.15136532802030092 11/01/23-15:43:45.059133 |
SID: | 2030092 |
Source Port: | 36532 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2337.107.12.635479275472023548 11/01/23-15:43:30.185922 |
SID: | 2023548 |
Source Port: | 54792 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23118.39.91.864061875472023548 11/01/23-15:44:00.323710 |
SID: | 2023548 |
Source Port: | 40618 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2339.110.149.993595275472023548 11/01/23-15:44:09.581494 |
SID: | 2023548 |
Source Port: | 35952 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2367.199.38.5053824802025883 11/01/23-15:43:58.879921 |
SID: | 2025883 |
Source Port: | 53824 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23192.34.8.24537574802025576 11/01/23-15:43:46.946539 |
SID: | 2025576 |
Source Port: | 37574 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2323.195.91.11657458802025883 11/01/23-15:43:54.601740 |
SID: | 2025883 |
Source Port: | 57458 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.232.23.255.541378802025883 11/01/23-15:44:35.297099 |
SID: | 2025883 |
Source Port: | 41378 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23218.41.147.1043537075472023548 11/01/23-15:43:37.660113 |
SID: | 2023548 |
Source Port: | 35370 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2320.27.77.10760736802025883 11/01/23-15:43:26.866222 |
SID: | 2025883 |
Source Port: | 60736 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2395.101.169.3554206802025883 11/01/23-15:43:33.104249 |
SID: | 2025883 |
Source Port: | 54206 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23149.160.1.1553350802030092 11/01/23-15:44:10.120609 |
SID: | 2030092 |
Source Port: | 53350 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2314.40.223.1774335275472023548 11/01/23-15:44:30.910063 |
SID: | 2023548 |
Source Port: | 43352 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23213.188.221.12355894528692025132 11/01/23-15:44:33.410116 |
SID: | 2025132 |
Source Port: | 55894 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | Attempted User Privilege Gain |
Timestamp: | 192.168.2.23194.42.17.25037814802030092 11/01/23-15:43:16.673780 |
SID: | 2030092 |
Source Port: | 37814 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23181.164.205.825911675472023548 11/01/23-15:43:42.791741 |
SID: | 2023548 |
Source Port: | 59116 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2314.198.77.3848980802030092 11/01/23-15:44:28.524319 |
SID: | 2030092 |
Source Port: | 48980 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2371.9.136.21557902802030092 11/01/23-15:42:55.394072 |
SID: | 2030092 |
Source Port: | 57902 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23189.18.71.1133696675472023548 11/01/23-15:44:10.358865 |
SID: | 2023548 |
Source Port: | 36966 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2383.167.111.1894768475472023548 11/01/23-15:44:21.302661 |
SID: | 2023548 |
Source Port: | 47684 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23146.160.221.836750802030092 11/01/23-15:42:55.364546 |
SID: | 2030092 |
Source Port: | 36750 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23118.180.32.3140066802025883 11/01/23-15:44:35.655223 |
SID: | 2025883 |
Source Port: | 40066 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2318.65.220.23857974802030092 11/01/23-15:43:18.350435 |
SID: | 2030092 |
Source Port: | 57974 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.221.134.2240404802030092 11/01/23-15:44:01.524116 |
SID: | 2030092 |
Source Port: | 40404 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2385.187.182.13843624802025883 11/01/23-15:44:18.576431 |
SID: | 2025883 |
Source Port: | 43624 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2323.200.248.17455788802030092 11/01/23-15:44:18.461571 |
SID: | 2030092 |
Source Port: | 55788 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23118.35.240.424407675472023548 11/01/23-15:43:49.021409 |
SID: | 2023548 |
Source Port: | 44076 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2313.236.36.4649054802030092 11/01/23-15:42:55.283660 |
SID: | 2030092 |
Source Port: | 49054 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2347.104.251.25045678802030092 11/01/23-15:43:15.111790 |
SID: | 2030092 |
Source Port: | 45678 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23220.95.210.24837606802030092 11/01/23-15:43:45.331039 |
SID: | 2030092 |
Source Port: | 37606 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2313.236.118.13153988802030092 11/01/23-15:43:44.714267 |
SID: | 2030092 |
Source Port: | 53988 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2391.121.39.1451124802025883 11/01/23-15:44:26.371313 |
SID: | 2025883 |
Source Port: | 51124 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23177.242.209.1326079475472023548 11/01/23-15:44:44.799057 |
SID: | 2023548 |
Source Port: | 60794 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2344.231.83.12250562802025576 11/01/23-15:42:57.109411 |
SID: | 2025576 |
Source Port: | 50562 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23189.230.144.1226091875472023548 11/01/23-15:43:15.149967 |
SID: | 2023548 |
Source Port: | 60918 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23213.155.225.20253166802030092 11/01/23-15:44:09.992224 |
SID: | 2030092 |
Source Port: | 53166 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2395.101.169.3554206802030092 11/01/23-15:43:33.104249 |
SID: | 2030092 |
Source Port: | 54206 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23192.34.52.10545514802025883 11/01/23-15:44:11.098648 |
SID: | 2025883 |
Source Port: | 45514 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23156.254.132.21758478802025883 11/01/23-15:43:26.895267 |
SID: | 2025883 |
Source Port: | 58478 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23174.116.22.2345656075472023548 11/01/23-15:44:49.202211 |
SID: | 2023548 |
Source Port: | 56560 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2323.195.91.11657458802030092 11/01/23-15:43:54.601740 |
SID: | 2030092 |
Source Port: | 57458 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23183.96.90.484499275472023548 11/01/23-15:44:12.201599 |
SID: | 2023548 |
Source Port: | 44992 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23147.46.58.1674553675472023548 11/01/23-15:44:30.730089 |
SID: | 2023548 |
Source Port: | 45536 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2362.73.25.3540150802030092 11/01/23-15:44:37.180556 |
SID: | 2030092 |
Source Port: | 40150 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2314.45.26.1023324275472023548 11/01/23-15:43:23.629314 |
SID: | 2023548 |
Source Port: | 33242 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23118.150.136.2054836275472023548 11/01/23-15:44:45.889988 |
SID: | 2023548 |
Source Port: | 48362 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23185.246.90.13743844802025883 11/01/23-15:44:16.839287 |
SID: | 2025883 |
Source Port: | 43844 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23156.254.109.14342756528692027339 11/01/23-15:43:41.483756 |
SID: | 2027339 |
Source Port: | 42756 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2334.230.38.16644328802025576 11/01/23-15:43:27.873295 |
SID: | 2025576 |
Source Port: | 44328 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23104.19.144.3558788802025576 11/01/23-15:43:27.588918 |
SID: | 2025576 |
Source Port: | 58788 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2394.242.177.1333582475472023548 11/01/23-15:44:10.136671 |
SID: | 2023548 |
Source Port: | 35824 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2383.167.111.1894752675472023548 11/01/23-15:44:16.864524 |
SID: | 2023548 |
Source Port: | 47526 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2366.228.47.11856454802025883 11/01/23-15:43:40.771144 |
SID: | 2025883 |
Source Port: | 56454 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2323.1.211.6549912802025883 11/01/23-15:43:54.841956 |
SID: | 2025883 |
Source Port: | 49912 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2358.111.85.1504377675472023548 11/01/23-15:44:06.155613 |
SID: | 2023548 |
Source Port: | 43776 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2335.212.83.15948932802030092 11/01/23-15:43:40.771231 |
SID: | 2030092 |
Source Port: | 48932 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2343.153.20.17635198802030092 11/01/23-15:44:07.458744 |
SID: | 2030092 |
Source Port: | 35198 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23222.117.99.2035974675472023548 11/01/23-15:43:45.692289 |
SID: | 2023548 |
Source Port: | 59746 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2352.152.100.24159060802030092 11/01/23-15:43:26.724724 |
SID: | 2030092 |
Source Port: | 59060 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23192.34.52.10545464802025883 11/01/23-15:44:10.106213 |
SID: | 2025883 |
Source Port: | 45464 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2350.109.83.2394227075472023548 11/01/23-15:44:40.663982 |
SID: | 2023548 |
Source Port: | 42270 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23116.82.151.1944661675472023548 11/01/23-15:44:40.196736 |
SID: | 2023548 |
Source Port: | 46616 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23185.96.214.953356802025576 11/01/23-15:43:27.689762 |
SID: | 2025576 |
Source Port: | 53356 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23176.29.126.2375916275472023548 11/01/23-15:44:22.158212 |
SID: | 2023548 |
Source Port: | 59162 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2382.177.126.1058416802030092 11/01/23-15:44:28.219017 |
SID: | 2030092 |
Source Port: | 58416 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.200.222.11446312802025883 11/01/23-15:44:33.874962 |
SID: | 2025883 |
Source Port: | 46312 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2341.102.14.514755275472023548 11/01/23-15:44:18.477057 |
SID: | 2023548 |
Source Port: | 47552 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23118.60.120.1473364275472023548 11/01/23-15:42:55.283127 |
SID: | 2023548 |
Source Port: | 33642 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23188.172.224.5956196802025883 11/01/23-15:44:26.383916 |
SID: | 2025883 |
Source Port: | 56196 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23114.35.182.5256980802030092 11/01/23-15:43:29.460017 |
SID: | 2030092 |
Source Port: | 56980 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23139.9.34.20148594802025883 11/01/23-15:43:54.361057 |
SID: | 2025883 |
Source Port: | 48594 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23156.254.132.21758498802025883 11/01/23-15:43:25.907178 |
SID: | 2025883 |
Source Port: | 58498 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23172.114.241.365873675472023548 11/01/23-15:44:37.466524 |
SID: | 2023548 |
Source Port: | 58736 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2358.111.85.1504374875472023548 11/01/23-15:44:05.839264 |
SID: | 2023548 |
Source Port: | 43748 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23115.6.60.585084275472023548 11/01/23-15:43:37.378898 |
SID: | 2023548 |
Source Port: | 50842 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23190.92.132.21956348802030092 11/01/23-15:44:30.310522 |
SID: | 2030092 |
Source Port: | 56348 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2383.167.111.1894756475472023548 11/01/23-15:44:17.086802 |
SID: | 2023548 |
Source Port: | 47564 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2367.7.25.13670075472023548 11/01/23-15:43:35.795128 |
SID: | 2023548 |
Source Port: | 36700 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23177.144.179.2034413275472023548 11/01/23-15:44:21.912989 |
SID: | 2023548 |
Source Port: | 44132 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23154.23.20.21440282802030092 11/01/23-15:43:45.038339 |
SID: | 2030092 |
Source Port: | 40282 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23118.54.97.545260475472023548 11/01/23-15:43:49.313024 |
SID: | 2023548 |
Source Port: | 52604 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2345.87.235.6346418802030092 11/01/23-15:44:15.075784 |
SID: | 2030092 |
Source Port: | 46418 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23201.211.173.4260754802025883 11/01/23-15:44:15.334253 |
SID: | 2025883 |
Source Port: | 60754 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2354.68.187.10954406802030092 11/01/23-15:44:21.002270 |
SID: | 2030092 |
Source Port: | 54406 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2372.227.96.563565075472023548 11/01/23-15:44:40.499209 |
SID: | 2023548 |
Source Port: | 35650 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23154.60.110.595217875472023548 11/01/23-15:43:21.020844 |
SID: | 2023548 |
Source Port: | 52178 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2350.110.194.1585233075472023548 11/01/23-15:43:17.196896 |
SID: | 2023548 |
Source Port: | 52330 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2385.150.142.1544617075472023548 11/01/23-15:43:22.381064 |
SID: | 2023548 |
Source Port: | 46170 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2338.145.101.5041822802025883 11/01/23-15:44:15.350700 |
SID: | 2025883 |
Source Port: | 41822 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2339.109.34.23050344802030092 11/01/23-15:43:21.263567 |
SID: | 2030092 |
Source Port: | 50344 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2354.196.186.6843812802030092 11/01/23-15:44:10.084083 |
SID: | 2030092 |
Source Port: | 43812 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2320.119.45.2652316802030092 11/01/23-15:43:44.411736 |
SID: | 2030092 |
Source Port: | 52316 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2396.114.149.6232856802025883 11/01/23-15:44:41.055337 |
SID: | 2025883 |
Source Port: | 32856 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23167.250.171.4954682802025883 11/01/23-15:43:54.261577 |
SID: | 2025883 |
Source Port: | 54682 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23114.117.251.21636156802025883 11/01/23-15:44:10.451976 |
SID: | 2025883 |
Source Port: | 36156 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23190.244.100.625721275472023548 11/01/23-15:44:45.230002 |
SID: | 2023548 |
Source Port: | 57212 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2386.162.31.2455214275472023548 11/01/23-15:44:06.699228 |
SID: | 2023548 |
Source Port: | 52142 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2394.99.160.2463299675472023548 11/01/23-15:44:30.373325 |
SID: | 2023548 |
Source Port: | 32996 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2314.78.177.1575536875472023548 11/01/23-15:43:15.980954 |
SID: | 2023548 |
Source Port: | 55368 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23104.166.131.10654414802025576 11/01/23-15:43:40.291177 |
SID: | 2025576 |
Source Port: | 54414 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23103.113.168.4151536802030092 11/01/23-15:43:39.968352 |
SID: | 2030092 |
Source Port: | 51536 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23213.176.252.2144780675472023548 11/01/23-15:44:22.639855 |
SID: | 2023548 |
Source Port: | 47806 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23186.13.16.975813275472023548 11/01/23-15:43:15.962695 |
SID: | 2023548 |
Source Port: | 58132 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23156.235.99.6750634528692027339 11/01/23-15:44:03.259287 |
SID: | 2027339 |
Source Port: | 50634 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23186.189.224.19137134802025883 11/01/23-15:43:15.186709 |
SID: | 2025883 |
Source Port: | 37134 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2394.71.148.173884875472023548 11/01/23-15:43:35.888841 |
SID: | 2023548 |
Source Port: | 38848 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23173.23.119.17547456802025883 11/01/23-15:44:15.186011 |
SID: | 2025883 |
Source Port: | 47456 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2383.167.111.1894741875472023548 11/01/23-15:44:12.576482 |
SID: | 2023548 |
Source Port: | 47418 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23104.148.103.14135406802030092 11/01/23-15:43:58.894391 |
SID: | 2030092 |
Source Port: | 35406 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23141.179.18.523892875472023548 11/01/23-15:43:41.514476 |
SID: | 2023548 |
Source Port: | 38928 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23175.244.32.1355253275472023548 11/01/23-15:44:48.218624 |
SID: | 2023548 |
Source Port: | 52532 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23118.40.124.403715075472023548 11/01/23-15:44:41.308095 |
SID: | 2023548 |
Source Port: | 37150 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2341.227.168.2486049875472023548 11/01/23-15:44:22.738296 |
SID: | 2023548 |
Source Port: | 60498 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23191.183.35.64003275472023548 11/01/23-15:44:45.890012 |
SID: | 2023548 |
Source Port: | 40032 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2323.80.26.23642628802025883 11/01/23-15:44:41.107463 |
SID: | 2025883 |
Source Port: | 42628 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2354.151.163.17051048802025883 11/01/23-15:43:33.398465 |
SID: | 2025883 |
Source Port: | 51048 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2347.183.253.2454833475472023548 11/01/23-15:44:37.183619 |
SID: | 2023548 |
Source Port: | 48334 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2334.64.182.7833196802025576 11/01/23-15:43:27.780912 |
SID: | 2025576 |
Source Port: | 33196 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23154.92.65.456954802030092 11/01/23-15:44:15.226855 |
SID: | 2030092 |
Source Port: | 56954 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23213.188.221.12355894528692027339 11/01/23-15:44:33.410116 |
SID: | 2027339 |
Source Port: | 55894 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23181.29.44.1503888075472023548 11/01/23-15:43:59.725852 |
SID: | 2023548 |
Source Port: | 38880 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23118.208.197.404817675472023548 11/01/23-15:44:37.390811 |
SID: | 2023548 |
Source Port: | 48176 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2364.50.167.18949522802030092 11/01/23-15:44:41.179940 |
SID: | 2030092 |
Source Port: | 49522 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.247.1.21437786802030092 11/01/23-15:44:15.201036 |
SID: | 2030092 |
Source Port: | 37786 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.39.146.18438420802025883 11/01/23-15:44:35.005272 |
SID: | 2025883 |
Source Port: | 38420 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23137.135.131.14644532802025883 11/01/23-15:43:53.058315 |
SID: | 2025883 |
Source Port: | 44532 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23181.166.175.2324137675472023548 11/01/23-15:44:21.483092 |
SID: | 2023548 |
Source Port: | 41376 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2313.248.207.15659666802030092 11/01/23-15:43:56.210484 |
SID: | 2030092 |
Source Port: | 59666 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.214.178.1236058802025883 11/01/23-15:43:27.932159 |
SID: | 2025883 |
Source Port: | 36058 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23178.37.118.2094678675472023548 11/01/23-15:44:09.543223 |
SID: | 2023548 |
Source Port: | 46786 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23183.78.226.7654328802025883 11/01/23-15:42:54.299065 |
SID: | 2025883 |
Source Port: | 54328 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2372.35.109.1963699475472023548 11/01/23-15:44:09.300737 |
SID: | 2023548 |
Source Port: | 36994 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23220.244.65.615850475472023548 11/01/23-15:44:40.896941 |
SID: | 2023548 |
Source Port: | 58504 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23109.157.108.935972475472023548 11/01/23-15:43:15.894277 |
SID: | 2023548 |
Source Port: | 59724 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2381.169.181.22050236802025883 11/01/23-15:44:34.168741 |
SID: | 2025883 |
Source Port: | 50236 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23172.247.140.15145652802030092 11/01/23-15:44:50.453297 |
SID: | 2030092 |
Source Port: | 45652 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23203.77.200.13156734802030092 11/01/23-15:44:30.277150 |
SID: | 2030092 |
Source Port: | 56734 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23221.152.185.2503754475472023548 11/01/23-15:44:02.199619 |
SID: | 2023548 |
Source Port: | 37544 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2345.150.67.20233076802025883 11/01/23-15:43:43.509682 |
SID: | 2025883 |
Source Port: | 33076 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23222.115.129.2515738875472023548 11/01/23-15:44:23.762798 |
SID: | 2023548 |
Source Port: | 57388 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2366.6.171.2841502802030092 11/01/23-15:43:44.522020 |
SID: | 2030092 |
Source Port: | 41502 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2371.30.39.394466075472023548 11/01/23-15:43:37.079302 |
SID: | 2023548 |
Source Port: | 44660 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2343.230.170.3047026802030092 11/01/23-15:44:11.638542 |
SID: | 2030092 |
Source Port: | 47026 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23181.4.134.524691875472023548 11/01/23-15:44:34.015100 |
SID: | 2023548 |
Source Port: | 46918 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23172.114.241.365879875472023548 11/01/23-15:44:37.635185 |
SID: | 2023548 |
Source Port: | 58798 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2367.7.25.13671275472023548 11/01/23-15:43:35.952444 |
SID: | 2023548 |
Source Port: | 36712 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23118.172.31.2005497275472023548 11/01/23-15:44:33.062367 |
SID: | 2023548 |
Source Port: | 54972 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23143.137.229.3646836802025883 11/01/23-15:44:04.042510 |
SID: | 2025883 |
Source Port: | 46836 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2394.71.148.173886475472023548 11/01/23-15:43:36.117272 |
SID: | 2023548 |
Source Port: | 38864 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23175.41.201.9341522802030092 11/01/23-15:43:16.345723 |
SID: | 2030092 |
Source Port: | 41522 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23208.74.69.17850024802030092 11/01/23-15:44:15.041652 |
SID: | 2030092 |
Source Port: | 50024 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2350.118.170.5360610802030092 11/01/23-15:44:10.161440 |
SID: | 2030092 |
Source Port: | 60610 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.85.151.22152644802030092 11/01/23-15:44:28.009637 |
SID: | 2030092 |
Source Port: | 52644 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23181.4.134.524704475472023548 11/01/23-15:44:39.616128 |
SID: | 2023548 |
Source Port: | 47044 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2344.227.218.7647444802030092 11/01/23-15:43:15.053657 |
SID: | 2030092 |
Source Port: | 47444 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23118.63.192.2263383475472023548 11/01/23-15:44:07.108813 |
SID: | 2023548 |
Source Port: | 33834 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23185.44.64.6160990802025883 11/01/23-15:43:55.496998 |
SID: | 2025883 |
Source Port: | 60990 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23195.178.134.656240802025883 11/01/23-15:43:26.765197 |
SID: | 2025883 |
Source Port: | 56240 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2354.199.122.23745452802025883 11/01/23-15:44:51.055763 |
SID: | 2025883 |
Source Port: | 45452 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2345.195.114.494372875472023548 11/01/23-15:44:10.307484 |
SID: | 2023548 |
Source Port: | 43728 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2382.146.56.13952488802030092 11/01/23-15:44:01.297915 |
SID: | 2030092 |
Source Port: | 52488 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2364.227.158.3647928802025576 11/01/23-15:43:28.975569 |
SID: | 2025576 |
Source Port: | 47928 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23172.67.165.10348114802030092 11/01/23-15:44:45.316521 |
SID: | 2030092 |
Source Port: | 48114 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23118.39.91.864063475472023548 11/01/23-15:44:00.607525 |
SID: | 2023548 |
Source Port: | 40634 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2366.96.231.1605203075472023548 11/01/23-15:44:31.743033 |
SID: | 2023548 |
Source Port: | 52030 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2364.223.129.1916071875472023548 11/01/23-15:44:33.875227 |
SID: | 2023548 |
Source Port: | 60718 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23201.235.54.673659475472023548 11/01/23-15:43:35.896907 |
SID: | 2023548 |
Source Port: | 36594 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2347.104.251.25045662802030092 11/01/23-15:43:15.094315 |
SID: | 2030092 |
Source Port: | 45662 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2341.230.227.774146475472023548 11/01/23-15:44:31.147743 |
SID: | 2023548 |
Source Port: | 41464 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23174.116.22.2345651875472023548 11/01/23-15:44:48.052663 |
SID: | 2023548 |
Source Port: | 56518 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23104.112.129.15335680802030092 11/01/23-15:43:14.875089 |
SID: | 2030092 |
Source Port: | 35680 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2395.101.169.3554266802030092 11/01/23-15:43:34.940649 |
SID: | 2030092 |
Source Port: | 54266 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23222.115.129.2515738275472023548 11/01/23-15:44:23.464241 |
SID: | 2023548 |
Source Port: | 57382 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23149.156.25.8950144802030092 11/01/23-15:44:44.005487 |
SID: | 2030092 |
Source Port: | 50144 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2347.146.94.1296093075472023548 11/01/23-15:43:31.265270 |
SID: | 2023548 |
Source Port: | 60930 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23201.205.178.945413875472023548 11/01/23-15:43:15.026954 |
SID: | 2023548 |
Source Port: | 54138 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2339.109.34.23050326802025883 11/01/23-15:43:18.946410 |
SID: | 2025883 |
Source Port: | 50326 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2323.82.34.853884802025883 11/01/23-15:43:15.039125 |
SID: | 2025883 |
Source Port: | 53884 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23189.18.112.1874675475472023548 11/01/23-15:44:00.442662 |
SID: | 2023548 |
Source Port: | 46754 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23154.210.53.8548836802025883 11/01/23-15:44:40.252750 |
SID: | 2025883 |
Source Port: | 48836 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23192.185.106.16841136802025576 11/01/23-15:43:27.889179 |
SID: | 2025576 |
Source Port: | 41136 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2352.59.173.2938108802030092 11/01/23-15:42:55.165589 |
SID: | 2030092 |
Source Port: | 38108 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23172.66.193.6960218802030092 11/01/23-15:43:49.771068 |
SID: | 2030092 |
Source Port: | 60218 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23112.165.68.1275428075472023548 11/01/23-15:43:45.386904 |
SID: | 2023548 |
Source Port: | 54280 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23115.20.201.2015435075472023548 11/01/23-15:43:17.491992 |
SID: | 2023548 |
Source Port: | 54350 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2347.108.38.7548452802025883 11/01/23-15:43:59.496571 |
SID: | 2025883 |
Source Port: | 48452 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2352.32.118.6238012802030092 11/01/23-15:44:26.377079 |
SID: | 2030092 |
Source Port: | 38012 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23125.154.67.1473919475472023548 11/01/23-15:43:31.609057 |
SID: | 2023548 |
Source Port: | 39194 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23172.90.233.633733875472023548 11/01/23-15:43:50.071788 |
SID: | 2023548 |
Source Port: | 37338 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2397.113.35.254401875472023548 11/01/23-15:43:22.195398 |
SID: | 2023548 |
Source Port: | 44018 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2359.16.238.1694109875472023548 11/01/23-15:44:49.808915 |
SID: | 2023548 |
Source Port: | 41098 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2366.129.112.11758236802030092 11/01/23-15:44:26.658437 |
SID: | 2030092 |
Source Port: | 58236 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23200.148.45.1143638275472023548 11/01/23-15:43:27.499554 |
SID: | 2023548 |
Source Port: | 36382 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23210.222.122.9457382802030092 11/01/23-15:44:52.538682 |
SID: | 2030092 |
Source Port: | 57382 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2385.148.240.2404041475472023548 11/01/23-15:44:24.563143 |
SID: | 2023548 |
Source Port: | 40414 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2399.233.235.584243875472023548 11/01/23-15:44:16.765135 |
SID: | 2023548 |
Source Port: | 42438 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23190.244.100.625722475472023548 11/01/23-15:44:45.509583 |
SID: | 2023548 |
Source Port: | 57224 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23174.17.181.1775244675472023548 11/01/23-15:44:13.003072 |
SID: | 2023548 |
Source Port: | 52446 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2395.84.7.2425514075472023548 11/01/23-15:43:36.116361 |
SID: | 2023548 |
Source Port: | 55140 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2389.148.228.954187675472023548 11/01/23-15:44:10.187045 |
SID: | 2023548 |
Source Port: | 41876 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2372.136.25.1804238475472023548 11/01/23-15:44:33.877255 |
SID: | 2023548 |
Source Port: | 42384 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2350.50.254.1324632275472023548 11/01/23-15:44:10.398815 |
SID: | 2023548 |
Source Port: | 46322 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23118.180.32.3140052802030092 11/01/23-15:44:34.368596 |
SID: | 2030092 |
Source Port: | 40052 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2347.35.76.9437272802030092 11/01/23-15:44:14.980583 |
SID: | 2030092 |
Source Port: | 37272 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23103.79.55.2147834528692025132 11/01/23-15:43:46.081209 |
SID: | 2025132 |
Source Port: | 47834 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | Attempted User Privilege Gain |
Timestamp: | 192.168.2.23156.254.132.21758554802025883 11/01/23-15:43:28.047630 |
SID: | 2025883 |
Source Port: | 58554 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2368.116.144.2523513675472023548 11/01/23-15:43:54.388671 |
SID: | 2023548 |
Source Port: | 35136 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23205.210.17.17057994802030092 11/01/23-15:43:34.882318 |
SID: | 2030092 |
Source Port: | 57994 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2344.240.196.4134876802030092 11/01/23-15:44:37.189415 |
SID: | 2030092 |
Source Port: | 34876 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2386.137.228.1066018875472023548 11/01/23-15:43:27.925461 |
SID: | 2023548 |
Source Port: | 60188 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23220.233.107.63338075472023548 11/01/23-15:44:06.855839 |
SID: | 2023548 |
Source Port: | 33380 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2345.223.151.1174097075472023548 11/01/23-15:44:17.110331 |
SID: | 2023548 |
Source Port: | 40970 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2368.116.144.2523509475472023548 11/01/23-15:43:54.247057 |
SID: | 2023548 |
Source Port: | 35094 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2341.230.227.774147675472023548 11/01/23-15:44:31.377870 |
SID: | 2023548 |
Source Port: | 41476 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23192.186.10.21948690802030092 11/01/23-15:43:28.050110 |
SID: | 2030092 |
Source Port: | 48690 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2354.226.41.3941590802030092 11/01/23-15:43:58.639584 |
SID: | 2030092 |
Source Port: | 41590 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2339.34.223.1113740475472023548 11/01/23-15:44:21.447834 |
SID: | 2023548 |
Source Port: | 37404 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23119.209.116.736047875472023548 11/01/23-15:43:27.329097 |
SID: | 2023548 |
Source Port: | 60478 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23156.254.132.21759000802025883 11/01/23-15:43:39.983650 |
SID: | 2025883 |
Source Port: | 59000 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23212.74.182.7941512802025883 11/01/23-15:44:18.581953 |
SID: | 2025883 |
Source Port: | 41512 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2385.148.240.2404040875472023548 11/01/23-15:44:23.352468 |
SID: | 2023548 |
Source Port: | 40408 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2366.129.112.11758722802025883 11/01/23-15:44:42.907726 |
SID: | 2025883 |
Source Port: | 58722 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23162.159.10.13151090802025883 11/01/23-15:43:40.992005 |
SID: | 2025883 |
Source Port: | 51090 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23186.127.244.1135561875472023548 11/01/23-15:43:49.284169 |
SID: | 2023548 |
Source Port: | 55618 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23190.200.135.11438898802025883 11/01/23-15:43:44.623953 |
SID: | 2025883 |
Source Port: | 38898 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23175.250.160.953639875472023548 11/01/23-15:44:00.050449 |
SID: | 2023548 |
Source Port: | 36398 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2323.1.191.2837322802025883 11/01/23-15:44:40.509118 |
SID: | 2025883 |
Source Port: | 37322 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23220.116.19.1654925275472023548 11/01/23-15:43:31.304789 |
SID: | 2023548 |
Source Port: | 49252 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23103.79.55.2147834528692027339 11/01/23-15:43:46.081209 |
SID: | 2027339 |
Source Port: | 47834 |
Destination Port: | 52869 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23105.68.36.2455217275472023548 11/01/23-15:44:23.410841 |
SID: | 2023548 |
Source Port: | 52172 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.232.143.194.273855075472023548 11/01/23-15:44:21.179858 |
SID: | 2023548 |
Source Port: | 38550 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23188.117.28.20258394802025883 11/01/23-15:44:50.981171 |
SID: | 2025883 |
Source Port: | 58394 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23192.185.109.7834790802025883 11/01/23-15:44:51.904798 |
SID: | 2025883 |
Source Port: | 34790 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23184.27.26.9957708802030092 11/01/23-15:43:29.249592 |
SID: | 2030092 |
Source Port: | 57708 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.237.130.14056308802030092 11/01/23-15:44:44.104384 |
SID: | 2030092 |
Source Port: | 56308 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2338.23.230.2303282675472023548 11/01/23-15:43:30.070095 |
SID: | 2023548 |
Source Port: | 32826 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23139.162.1.18244790802025883 11/01/23-15:43:33.386707 |
SID: | 2025883 |
Source Port: | 44790 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2324.208.93.2523797875472023548 11/01/23-15:44:45.913075 |
SID: | 2023548 |
Source Port: | 37978 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23204.188.232.10549852802025883 11/01/23-15:44:01.083001 |
SID: | 2025883 |
Source Port: | 49852 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2375.141.67.14941896802025883 11/01/23-15:43:26.768774 |
SID: | 2025883 |
Source Port: | 41896 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23208.123.187.1004267075472023548 11/01/23-15:43:27.029229 |
SID: | 2023548 |
Source Port: | 42670 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2338.55.145.7040738802030092 11/01/23-15:44:43.167104 |
SID: | 2030092 |
Source Port: | 40738 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2385.214.86.3253268802030092 11/01/23-15:44:50.973025 |
SID: | 2030092 |
Source Port: | 53268 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.214.136.17043542802025883 11/01/23-15:44:34.142366 |
SID: | 2025883 |
Source Port: | 43542 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.23104.16.216.17535082802025883 11/01/23-15:44:14.951462 |
SID: | 2025883 |
Source Port: | 35082 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Attempted Administrator Privilege Gain |
Timestamp: | 192.168.2.2359.16.238.1694109075472023548 11/01/23-15:44:49.503327 |
SID: | 2023548 |
Source Port: | 41090 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23112.177.225.395223475472023548 11/01/23-15:43:26.595248 |
SID: | 2023548 |
Source Port: | 52234 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2314.85.63.1415587875472023548 11/01/23-15:44:13.593127 |
SID: | 2023548 |
Source Port: | 55878 |
Destination Port: | 7547 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
- • AV Detection
- • Spreading
- • Networking
- • System Summary
- • Persistence and Installation Behavior
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Stealing of Sensitive Information
- • Remote Access Functionality
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira: |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | String: | ||
Source: | String: | ||
Source: | String: |
Networking |
---|
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: |
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | HTTP traffic detected: |