Linux
Analysis Report
OVUvXelh6s
Overview
General Information
Detection
Gafgyt, Mirai
Score: | 96 |
Range: | 0 - 100 |
Whitelisted: | false |
Signatures
Yara detected Mirai
Multi AV Scanner detection for submitted file
Yara detected Gafgyt
Malicious sample detected (through community Yara rule)
Snort IDS alert for network traffic
Uses known network protocols on non-standard ports
Sample tries to kill multiple processes (SIGKILL)
Yara signature match
Uses the "uname" system call to query kernel version information (possible evasion)
Enumerates processes within the "proc" file system
Detected TCP or UDP traffic on non-standard ports
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Creates hidden files and/or directories
Sample has stripped symbol table
HTTP GET or POST without a user agent
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Classification
Analysis Advice
Some HTTP requests failed (404). It is likely that the sample will exhibit less behavior. |
Static ELF header machine description suggests that the sample might not execute correctly on this machine. |
Joe Sandbox Version: | 35.0.0 Citrine |
Analysis ID: | 676922 |
Start date and time: 01/08/202221:41:59 | 2022-08-01 21:41:59 +02:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 5m 22s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | OVUvXelh6s |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11) |
Analysis Mode: | default |
Detection: | MAL |
Classification: | mal96.spre.troj.lin@0/0@1/0 |
- Report size exceeded maximum capacity and may have missing network information.
Command: | /tmp/OVUvXelh6s |
PID: | 6229 |
Exit Code: | 0 |
Exit Code Info: | |
Killed: | False |
Standard Output: | /exe |
Standard Error: |
- system is lnxubuntu20
- OVUvXelh6s New Fork (PID: 6232, Parent: 6229)
- OVUvXelh6s New Fork (PID: 6234, Parent: 6232)
- OVUvXelh6s New Fork (PID: 6236, Parent: 6232)
- OVUvXelh6s New Fork (PID: 6237, Parent: 6232)
- OVUvXelh6s New Fork (PID: 6240, Parent: 6232)
- OVUvXelh6s New Fork (PID: 6243, Parent: 6232)
- OVUvXelh6s New Fork (PID: 6245, Parent: 6232)
- xfce4-panel New Fork (PID: 6249, Parent: 2063)
- xfce4-panel New Fork (PID: 6250, Parent: 2063)
- xfce4-panel New Fork (PID: 6251, Parent: 2063)
- xfce4-panel New Fork (PID: 6252, Parent: 2063)
- wrapper-2.0 New Fork (PID: 6266, Parent: 6252)
- xfce4-panel New Fork (PID: 6253, Parent: 2063)
- xfce4-panel New Fork (PID: 6254, Parent: 2063)
- dbus-daemon New Fork (PID: 6268, Parent: 6267)
- systemd New Fork (PID: 6274, Parent: 1860)
- cleanup
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
SUSP_XORed_Mozilla | Detects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key. | Florian Roth |
| |
MAL_ELF_LNX_Mirai_Oct10_1 | Detects ELF Mirai variant | Florian Roth |
| |
JoeSecurity_Mirai_8 | Yara detected Mirai | Joe Security | ||
JoeSecurity_Gafgyt | Yara detected Gafgyt | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Mirai_12 | Yara detected Mirai | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
SUSP_XORed_Mozilla | Detects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key. | Florian Roth |
| |
SUSP_XORed_Mozilla | Detects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key. | Florian Roth |
| |
SUSP_XORed_Mozilla | Detects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key. | Florian Roth |
| |
MAL_ELF_LNX_Mirai_Oct10_1 | Detects ELF Mirai variant | Florian Roth |
| |
JoeSecurity_Mirai_8 | Yara detected Mirai | Joe Security | ||
Click to see the 7 entries |
Timestamp: | 192.168.2.23156.241.71.21059238372152835222 08/01/22-21:44:03.916656 |
SID: | 2835222 |
Source Port: | 59238 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23189.234.80.21538110802030092 08/01/22-21:44:07.005633 |
SID: | 2030092 |
Source Port: | 38110 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2368.185.99.20935816802030092 08/01/22-21:43:13.663647 |
SID: | 2030092 |
Source Port: | 35816 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23165.227.136.11447572802030092 08/01/22-21:44:10.650191 |
SID: | 2030092 |
Source Port: | 47572 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2368.185.99.20936816802030092 08/01/22-21:43:20.679190 |
SID: | 2030092 |
Source Port: | 36816 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23185.205.204.6953266802030092 08/01/22-21:43:30.846928 |
SID: | 2030092 |
Source Port: | 53266 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23121.37.223.20554428802030092 08/01/22-21:44:19.227513 |
SID: | 2030092 |
Source Port: | 54428 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.84.97.12542216802030092 08/01/22-21:42:48.696237 |
SID: | 2030092 |
Source Port: | 42216 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23159.223.22.158968802030092 08/01/22-21:43:36.248531 |
SID: | 2030092 |
Source Port: | 58968 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23114.38.50.21636550802030092 08/01/22-21:43:48.223963 |
SID: | 2030092 |
Source Port: | 36550 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23129.151.68.14147430802030092 08/01/22-21:44:06.831234 |
SID: | 2030092 |
Source Port: | 47430 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.250.4.22649256372152835222 08/01/22-21:44:45.466949 |
SID: | 2835222 |
Source Port: | 49256 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2323.61.242.1336374802030092 08/01/22-21:44:29.697542 |
SID: | 2030092 |
Source Port: | 36374 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2338.104.254.9160156802030092 08/01/22-21:44:45.965592 |
SID: | 2030092 |
Source Port: | 60156 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2339.107.204.24558666802030092 08/01/22-21:43:10.746811 |
SID: | 2030092 |
Source Port: | 58666 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.59.25.2852488802030092 08/01/22-21:43:13.660201 |
SID: | 2030092 |
Source Port: | 52488 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.250.5.18742724372152835222 08/01/22-21:43:51.827480 |
SID: | 2835222 |
Source Port: | 42724 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23114.215.99.2160586802030092 08/01/22-21:43:55.819010 |
SID: | 2030092 |
Source Port: | 60586 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.250.20.15139948372152835222 08/01/22-21:44:48.388963 |
SID: | 2835222 |
Source Port: | 39948 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23116.203.65.18438444802030092 08/01/22-21:44:34.561582 |
SID: | 2030092 |
Source Port: | 38444 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2335.172.18.9050760802030092 08/01/22-21:43:44.894388 |
SID: | 2030092 |
Source Port: | 50760 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2398.187.3.12740638802030092 08/01/22-21:44:29.975935 |
SID: | 2030092 |
Source Port: | 40638 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23118.178.187.333556802030092 08/01/22-21:43:26.793256 |
SID: | 2030092 |
Source Port: | 33556 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23184.72.203.9443100802030092 08/01/22-21:42:53.125672 |
SID: | 2030092 |
Source Port: | 43100 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.245.33.23260284372152835222 08/01/22-21:43:40.624572 |
SID: | 2835222 |
Source Port: | 60284 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2378.79.199.5153232802030092 08/01/22-21:44:09.712620 |
SID: | 2030092 |
Source Port: | 53232 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23201.131.190.4351752802030092 08/01/22-21:43:13.695788 |
SID: | 2030092 |
Source Port: | 51752 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2354.172.165.4739538802030092 08/01/22-21:43:44.894644 |
SID: | 2030092 |
Source Port: | 39538 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2397.107.190.18749444802030092 08/01/22-21:44:32.076516 |
SID: | 2030092 |
Source Port: | 49444 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.94.53.18546496802030092 08/01/22-21:43:36.834701 |
SID: | 2030092 |
Source Port: | 46496 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23195.7.237.21849872802030092 08/01/22-21:44:28.274817 |
SID: | 2030092 |
Source Port: | 49872 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2347.243.240.14934052802030092 08/01/22-21:42:50.252241 |
SID: | 2030092 |
Source Port: | 34052 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23172.64.89.23238446802030092 08/01/22-21:43:03.440177 |
SID: | 2030092 |
Source Port: | 38446 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23143.204.237.10247882802030092 08/01/22-21:44:09.597541 |
SID: | 2030092 |
Source Port: | 47882 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2345.157.68.20533964802030092 08/01/22-21:43:44.638954 |
SID: | 2030092 |
Source Port: | 33964 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23186.6.10.21756154802030092 08/01/22-21:44:29.735491 |
SID: | 2030092 |
Source Port: | 56154 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23209.141.56.9856352802030092 08/01/22-21:43:28.912207 |
SID: | 2030092 |
Source Port: | 56352 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23172.74.6.8551840802030092 08/01/22-21:44:25.779761 |
SID: | 2030092 |
Source Port: | 51840 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2366.27.81.13351078802030092 08/01/22-21:43:13.947751 |
SID: | 2030092 |
Source Port: | 51078 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2313.249.186.19453804802030092 08/01/22-21:42:54.171856 |
SID: | 2030092 |
Source Port: | 53804 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.232.92.15537470372152835222 08/01/22-21:44:10.672199 |
SID: | 2835222 |
Source Port: | 37470 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23104.117.162.14655398802030092 08/01/22-21:44:34.723576 |
SID: | 2030092 |
Source Port: | 55398 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.56.179.11845340802030092 08/01/22-21:43:33.945090 |
SID: | 2030092 |
Source Port: | 45340 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23178.44.174.11546006802030092 08/01/22-21:44:37.441296 |
SID: | 2030092 |
Source Port: | 46006 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2351.178.38.4354260802030092 08/01/22-21:43:10.695311 |
SID: | 2030092 |
Source Port: | 54260 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2337.203.112.14852556802030092 08/01/22-21:42:48.732504 |
SID: | 2030092 |
Source Port: | 52556 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.231.87.19733918802030092 08/01/22-21:43:33.911391 |
SID: | 2030092 |
Source Port: | 33918 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.225.151.12757152372152835222 08/01/22-21:43:41.212416 |
SID: | 2835222 |
Source Port: | 57152 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23156.245.49.4655710372152835222 08/01/22-21:44:08.819463 |
SID: | 2835222 |
Source Port: | 55710 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2372.250.72.358316802030092 08/01/22-21:43:10.590944 |
SID: | 2030092 |
Source Port: | 58316 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23120.133.78.8554672802030092 08/01/22-21:43:23.365177 |
SID: | 2030092 |
Source Port: | 54672 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23202.120.29.8742212802030092 08/01/22-21:44:16.504772 |
SID: | 2030092 |
Source Port: | 42212 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.226.35.21036842372152835222 08/01/22-21:43:47.453255 |
SID: | 2835222 |
Source Port: | 36842 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23193.54.76.4944602802030092 08/01/22-21:43:30.908777 |
SID: | 2030092 |
Source Port: | 44602 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23193.142.42.24545838802030092 08/01/22-21:44:10.643254 |
SID: | 2030092 |
Source Port: | 45838 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.52.15.13854136802030092 08/01/22-21:44:16.974033 |
SID: | 2030092 |
Source Port: | 54136 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.250.16.21753554372152835222 08/01/22-21:44:40.566789 |
SID: | 2835222 |
Source Port: | 53554 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2366.33.212.21853714802030092 08/01/22-21:42:48.603074 |
SID: | 2030092 |
Source Port: | 53714 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.252.80.18451490802030092 08/01/22-21:44:18.807660 |
SID: | 2030092 |
Source Port: | 51490 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2318.65.95.19443666802030092 08/01/22-21:43:48.305838 |
SID: | 2030092 |
Source Port: | 43666 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.241.87.25138776372152835222 08/01/22-21:43:17.110536 |
SID: | 2835222 |
Source Port: | 38776 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2318.234.197.15646986802030092 08/01/22-21:43:47.961611 |
SID: | 2030092 |
Source Port: | 46986 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2345.142.126.11436662802030092 08/01/22-21:44:34.678182 |
SID: | 2030092 |
Source Port: | 36662 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.226.58.24245398372152835222 08/01/22-21:44:48.376745 |
SID: | 2835222 |
Source Port: | 45398 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23161.129.181.636124802030092 08/01/22-21:43:07.781502 |
SID: | 2030092 |
Source Port: | 36124 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2374.123.155.24735640802030092 08/01/22-21:44:00.014210 |
SID: | 2030092 |
Source Port: | 35640 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2354.152.197.16757490802030092 08/01/22-21:43:18.957932 |
SID: | 2030092 |
Source Port: | 57490 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.165.196.23054026802030092 08/01/22-21:44:37.955392 |
SID: | 2030092 |
Source Port: | 54026 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.244.67.5560438372152835222 08/01/22-21:43:02.434663 |
SID: | 2835222 |
Source Port: | 60438 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23108.157.145.3145016802030092 08/01/22-21:43:49.771657 |
SID: | 2030092 |
Source Port: | 45016 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.97.50.22645538802030092 08/01/22-21:43:55.786553 |
SID: | 2030092 |
Source Port: | 45538 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.34.68.12658378802030092 08/01/22-21:43:40.605839 |
SID: | 2030092 |
Source Port: | 58378 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.254.91.3435898372152835222 08/01/22-21:44:38.757435 |
SID: | 2835222 |
Source Port: | 35898 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.238.142.39.24537920802030092 08/01/22-21:43:59.879516 |
SID: | 2030092 |
Source Port: | 37920 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23108.63.24.3146582802030092 08/01/22-21:44:29.394343 |
SID: | 2030092 |
Source Port: | 46582 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.241.123.3557626372152835222 08/01/22-21:43:11.933589 |
SID: | 2835222 |
Source Port: | 57626 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23115.231.230.24043298802030092 08/01/22-21:43:16.783235 |
SID: | 2030092 |
Source Port: | 43298 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2369.94.153.643756802030092 08/01/22-21:44:48.068792 |
SID: | 2030092 |
Source Port: | 43756 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2354.207.227.13736824802030092 08/01/22-21:44:15.545078 |
SID: | 2030092 |
Source Port: | 36824 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2350.109.162.16249608802030092 08/01/22-21:43:23.896720 |
SID: | 2030092 |
Source Port: | 49608 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23159.223.20.12056852802030092 08/01/22-21:44:37.792625 |
SID: | 2030092 |
Source Port: | 56852 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23203.198.147.14256468802030092 08/01/22-21:43:26.558318 |
SID: | 2030092 |
Source Port: | 56468 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23213.188.220.19157680802030092 08/01/22-21:43:40.416494 |
SID: | 2030092 |
Source Port: | 57680 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23172.65.10.15347052802030092 08/01/22-21:43:26.691064 |
SID: | 2030092 |
Source Port: | 47052 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23125.156.53.9358916802030092 08/01/22-21:44:35.451080 |
SID: | 2030092 |
Source Port: | 58916 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.235.99.25553338372152835222 08/01/22-21:42:59.143422 |
SID: | 2835222 |
Source Port: | 53338 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23172.80.102.14955286802030092 08/01/22-21:44:13.126485 |
SID: | 2030092 |
Source Port: | 55286 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2334.232.175.13652930802030092 08/01/22-21:43:13.917537 |
SID: | 2030092 |
Source Port: | 52930 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2382.181.147.23043464802030092 08/01/22-21:44:21.792537 |
SID: | 2030092 |
Source Port: | 43464 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.250.94.19738396372152835222 08/01/22-21:44:28.214139 |
SID: | 2835222 |
Source Port: | 38396 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23156.240.106.17644862372152835222 08/01/22-21:43:47.656079 |
SID: | 2835222 |
Source Port: | 44862 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23151.236.64.4246758802030092 08/01/22-21:43:07.807977 |
SID: | 2030092 |
Source Port: | 46758 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2381.140.4.11745358802030092 08/01/22-21:43:58.297106 |
SID: | 2030092 |
Source Port: | 45358 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23121.177.183.9340716802030092 08/01/22-21:44:35.077396 |
SID: | 2030092 |
Source Port: | 40716 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23184.25.235.15459078802030092 08/01/22-21:43:45.214240 |
SID: | 2030092 |
Source Port: | 59078 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.226.40.16838466372152835222 08/01/22-21:44:06.517088 |
SID: | 2835222 |
Source Port: | 38466 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2323.199.146.21851524802030092 08/01/22-21:43:53.541425 |
SID: | 2030092 |
Source Port: | 51524 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23118.215.65.14039438802030092 08/01/22-21:42:53.587433 |
SID: | 2030092 |
Source Port: | 39438 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23222.186.142.19355834802030092 08/01/22-21:43:13.743007 |
SID: | 2030092 |
Source Port: | 55834 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23159.65.148.6142562802030092 08/01/22-21:43:33.447462 |
SID: | 2030092 |
Source Port: | 42562 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.37.72.2954034802030092 08/01/22-21:44:25.789964 |
SID: | 2030092 |
Source Port: | 54034 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2366.254.111.7147354802030092 08/01/22-21:43:58.365582 |
SID: | 2030092 |
Source Port: | 47354 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2313.111.235.10957320802030092 08/01/22-21:44:18.890118 |
SID: | 2030092 |
Source Port: | 57320 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23116.177.252.1341912802030092 08/01/22-21:44:17.185693 |
SID: | 2030092 |
Source Port: | 41912 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.226.113.10235300372152835222 08/01/22-21:44:48.094836 |
SID: | 2835222 |
Source Port: | 35300 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2346.102.158.6646992802030092 08/01/22-21:44:37.799144 |
SID: | 2030092 |
Source Port: | 46992 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23154.213.92.21543426802030092 08/01/22-21:44:19.191723 |
SID: | 2030092 |
Source Port: | 43426 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2345.200.73.7442982802030092 08/01/22-21:44:17.171591 |
SID: | 2030092 |
Source Port: | 42982 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2389.31.79.10733468802030092 08/01/22-21:44:24.572998 |
SID: | 2030092 |
Source Port: | 33468 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23178.32.2.23845880802030092 08/01/22-21:43:33.475216 |
SID: | 2030092 |
Source Port: | 45880 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2365.39.89.3434108802030092 08/01/22-21:44:34.683593 |
SID: | 2030092 |
Source Port: | 34108 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2313.111.44.14647082802030092 08/01/22-21:43:23.504305 |
SID: | 2030092 |
Source Port: | 47082 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2341.0.90.7652074372152835222 08/01/22-21:43:51.337955 |
SID: | 2835222 |
Source Port: | 52074 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2354.36.140.12454112802030092 08/01/22-21:43:32.244077 |
SID: | 2030092 |
Source Port: | 54112 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2382.114.138.21435324802030092 08/01/22-21:43:13.736491 |
SID: | 2030092 |
Source Port: | 35324 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.254.49.22446432372152835222 08/01/22-21:44:35.010585 |
SID: | 2835222 |
Source Port: | 46432 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23195.103.138.8536384802030092 08/01/22-21:43:44.726548 |
SID: | 2030092 |
Source Port: | 36384 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23116.77.74.11555746802030092 08/01/22-21:44:42.546032 |
SID: | 2030092 |
Source Port: | 55746 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23111.202.8.4737282802030092 08/01/22-21:44:37.502675 |
SID: | 2030092 |
Source Port: | 37282 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.230.31.12533408372152835222 08/01/22-21:43:31.757737 |
SID: | 2835222 |
Source Port: | 33408 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2313.32.169.18140996802030092 08/01/22-21:43:49.687593 |
SID: | 2030092 |
Source Port: | 40996 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23218.153.216.3442448802030092 08/01/22-21:43:19.218058 |
SID: | 2030092 |
Source Port: | 42448 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23159.223.33.18137688802030092 08/01/22-21:43:10.969094 |
SID: | 2030092 |
Source Port: | 37688 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.37.53.12650798802030092 08/01/22-21:43:36.688244 |
SID: | 2030092 |
Source Port: | 50798 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23185.21.11.18945088802030092 08/01/22-21:44:20.859867 |
SID: | 2030092 |
Source Port: | 45088 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2320.89.27.16337180802030092 08/01/22-21:43:08.132403 |
SID: | 2030092 |
Source Port: | 37180 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23197.244.91.4134138372152835222 08/01/22-21:44:25.788655 |
SID: | 2835222 |
Source Port: | 34138 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2394.100.180.4959400802030092 08/01/22-21:44:37.413206 |
SID: | 2030092 |
Source Port: | 59400 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23115.29.196.14851692802030092 08/01/22-21:44:44.304902 |
SID: | 2030092 |
Source Port: | 51692 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.68.147.17255470802030092 08/01/22-21:44:32.029239 |
SID: | 2030092 |
Source Port: | 55470 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23108.187.242.10241180802030092 08/01/22-21:44:32.112725 |
SID: | 2030092 |
Source Port: | 41180 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23122.70.156.12247266802030092 08/01/22-21:44:34.811691 |
SID: | 2030092 |
Source Port: | 47266 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.225.150.17936134372152835222 08/01/22-21:43:57.426705 |
SID: | 2835222 |
Source Port: | 36134 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2352.66.74.11740124802030092 08/01/22-21:44:37.495274 |
SID: | 2030092 |
Source Port: | 40124 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23211.237.13.7455608802030092 08/01/22-21:42:48.719622 |
SID: | 2030092 |
Source Port: | 55608 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.45.139.20959156802030092 08/01/22-21:43:59.901503 |
SID: | 2030092 |
Source Port: | 59156 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.244.114.20439860372152835222 08/01/22-21:43:18.418457 |
SID: | 2835222 |
Source Port: | 39860 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23156.226.11.1948654372152835222 08/01/22-21:43:43.740032 |
SID: | 2835222 |
Source Port: | 48654 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23195.179.108.16241738802030092 08/01/22-21:44:37.627546 |
SID: | 2030092 |
Source Port: | 41738 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23194.116.229.17051662802030092 08/01/22-21:44:12.996082 |
SID: | 2030092 |
Source Port: | 51662 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.226.54.2256042372152835222 08/01/22-21:44:20.875635 |
SID: | 2835222 |
Source Port: | 56042 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23147.75.231.5733416802030092 08/01/22-21:42:50.580747 |
SID: | 2030092 |
Source Port: | 33416 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23107.149.248.7641246802030092 08/01/22-21:44:42.235798 |
SID: | 2030092 |
Source Port: | 41246 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2378.25.124.5849090802030092 08/01/22-21:44:21.990290 |
SID: | 2030092 |
Source Port: | 49090 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.47.85.10543022802030092 08/01/22-21:43:44.743925 |
SID: | 2030092 |
Source Port: | 43022 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2312.118.139.18639766802030092 08/01/22-21:44:06.642968 |
SID: | 2030092 |
Source Port: | 39766 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.79.201.19556962802030092 08/01/22-21:44:31.799844 |
SID: | 2030092 |
Source Port: | 56962 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.226.35.20235340372152835222 08/01/22-21:44:01.012671 |
SID: | 2835222 |
Source Port: | 35340 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23178.175.133.25353942802030092 08/01/22-21:44:16.047300 |
SID: | 2030092 |
Source Port: | 53942 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2347.90.115.14634646802030092 08/01/22-21:43:36.769054 |
SID: | 2030092 |
Source Port: | 34646 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.218.193.22153306802030092 08/01/22-21:44:25.886178 |
SID: | 2030092 |
Source Port: | 53306 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.238.218.139.5936172802030092 08/01/22-21:44:07.267716 |
SID: | 2030092 |
Source Port: | 36172 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2385.187.145.16560756802030092 08/01/22-21:43:29.071539 |
SID: | 2030092 |
Source Port: | 60756 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23149.96.236.14651758802030092 08/01/22-21:43:44.766688 |
SID: | 2030092 |
Source Port: | 51758 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23194.182.81.22854648802030092 08/01/22-21:44:05.527465 |
SID: | 2030092 |
Source Port: | 54648 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.19.239.14736340802030092 08/01/22-21:44:45.983558 |
SID: | 2030092 |
Source Port: | 36340 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.228.112.8348762802030092 08/01/22-21:44:09.714195 |
SID: | 2030092 |
Source Port: | 48762 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23197.15.87.15560466802030092 08/01/22-21:42:49.906093 |
SID: | 2030092 |
Source Port: | 60466 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23174.21.15.23460914802030092 08/01/22-21:44:42.261715 |
SID: | 2030092 |
Source Port: | 60914 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23134.209.156.7157152802030092 08/01/22-21:44:47.857465 |
SID: | 2030092 |
Source Port: | 57152 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23102.134.8.23348676802030092 08/01/22-21:43:44.912132 |
SID: | 2030092 |
Source Port: | 48676 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23119.3.107.14153368802030092 08/01/22-21:43:23.431399 |
SID: | 2030092 |
Source Port: | 53368 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.131.95.4643076802030092 08/01/22-21:43:26.577257 |
SID: | 2030092 |
Source Port: | 43076 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.93.226.24532792802030092 08/01/22-21:44:21.980560 |
SID: | 2030092 |
Source Port: | 32792 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2354.208.143.4634652802030092 08/01/22-21:43:36.356907 |
SID: | 2030092 |
Source Port: | 34652 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.94.129.25248052802030092 08/01/22-21:43:17.156897 |
SID: | 2030092 |
Source Port: | 48052 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2354.36.140.12454058802030092 08/01/22-21:43:30.874930 |
SID: | 2030092 |
Source Port: | 54058 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2387.248.148.7045664802030092 08/01/22-21:43:40.475287 |
SID: | 2030092 |
Source Port: | 45664 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2382.181.145.156940802030092 08/01/22-21:44:47.745053 |
SID: | 2030092 |
Source Port: | 56940 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.251.202.15248048802030092 08/01/22-21:43:48.096491 |
SID: | 2030092 |
Source Port: | 48048 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23120.78.132.21757432802030092 08/01/22-21:42:48.684890 |
SID: | 2030092 |
Source Port: | 57432 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.240.108.8160036372152835222 08/01/22-21:43:55.645679 |
SID: | 2835222 |
Source Port: | 60036 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2373.10.22.8548680802030092 08/01/22-21:44:45.973052 |
SID: | 2030092 |
Source Port: | 48680 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23122.176.17.20453502802030092 08/01/22-21:43:13.960365 |
SID: | 2030092 |
Source Port: | 53502 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.233.90.20358762802030092 08/01/22-21:44:02.672341 |
SID: | 2030092 |
Source Port: | 58762 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.244.79.21950328372152835222 08/01/22-21:44:40.266764 |
SID: | 2835222 |
Source Port: | 50328 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2369.161.144.5737226802030092 08/01/22-21:44:41.894372 |
SID: | 2030092 |
Source Port: | 37226 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23195.20.99.13650212802030092 08/01/22-21:43:10.755364 |
SID: | 2030092 |
Source Port: | 50212 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23180.178.179.19253394802030092 08/01/22-21:42:53.137032 |
SID: | 2030092 |
Source Port: | 53394 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23141.147.3.7147096802030092 08/01/22-21:44:44.002139 |
SID: | 2030092 |
Source Port: | 47096 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.212.145.12935382802030092 08/01/22-21:43:42.294841 |
SID: | 2030092 |
Source Port: | 35382 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2334.230.205.12144730802030092 08/01/22-21:43:26.616720 |
SID: | 2030092 |
Source Port: | 44730 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23159.223.2.8249796802030092 08/01/22-21:43:26.703971 |
SID: | 2030092 |
Source Port: | 49796 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23173.222.95.3458504802030092 08/01/22-21:43:27.079060 |
SID: | 2030092 |
Source Port: | 58504 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23106.104.114.6338754802030092 08/01/22-21:44:22.209816 |
SID: | 2030092 |
Source Port: | 38754 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23168.76.165.1035638802030092 08/01/22-21:43:55.856175 |
SID: | 2030092 |
Source Port: | 35638 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.52.241.7443616802030092 08/01/22-21:44:42.859602 |
SID: | 2030092 |
Source Port: | 43616 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2318.139.139.14155128802030092 08/01/22-21:44:29.608792 |
SID: | 2030092 |
Source Port: | 55128 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23210.86.230.12335196802030092 08/01/22-21:44:21.115821 |
SID: | 2030092 |
Source Port: | 35196 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2318.233.110.1546178802030092 08/01/22-21:44:47.829816 |
SID: | 2030092 |
Source Port: | 46178 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23185.219.23.14146768802030092 08/01/22-21:43:49.982820 |
SID: | 2030092 |
Source Port: | 46768 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23144.168.211.23858646802030092 08/01/22-21:44:02.628324 |
SID: | 2030092 |
Source Port: | 58646 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2335.156.153.17043042802030092 08/01/22-21:43:29.785111 |
SID: | 2030092 |
Source Port: | 43042 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23120.77.87.21857524802030092 08/01/22-21:44:06.067720 |
SID: | 2030092 |
Source Port: | 57524 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2354.192.124.22343122802030092 08/01/22-21:44:41.758744 |
SID: | 2030092 |
Source Port: | 43122 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23192.140.114.20458834802030092 08/01/22-21:44:25.829222 |
SID: | 2030092 |
Source Port: | 58834 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23175.234.38.4257332802030092 08/01/22-21:44:37.635557 |
SID: | 2030092 |
Source Port: | 57332 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.241.106.20759960372152835222 08/01/22-21:43:11.929539 |
SID: | 2835222 |
Source Port: | 59960 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2368.185.99.20936284802030092 08/01/22-21:43:16.775530 |
SID: | 2030092 |
Source Port: | 36284 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2335.186.205.3042034802030092 08/01/22-21:42:58.320132 |
SID: | 2030092 |
Source Port: | 42034 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.226.48.4860208372152835222 08/01/22-21:43:25.931001 |
SID: | 2835222 |
Source Port: | 60208 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23208.118.193.11754464802030092 08/01/22-21:43:53.362264 |
SID: | 2030092 |
Source Port: | 54464 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23147.50.132.8144374802030092 08/01/22-21:44:47.354499 |
SID: | 2030092 |
Source Port: | 44374 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.225.157.16747276372152835222 08/01/22-21:43:19.999840 |
SID: | 2835222 |
Source Port: | 47276 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23194.48.213.15243088802030092 08/01/22-21:43:13.695642 |
SID: | 2030092 |
Source Port: | 43088 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23185.12.205.11736706802030092 08/01/22-21:44:31.950032 |
SID: | 2030092 |
Source Port: | 36706 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2338.48.224.11941330802030092 08/01/22-21:43:36.388113 |
SID: | 2030092 |
Source Port: | 41330 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2331.40.224.18145384802030092 08/01/22-21:44:12.992020 |
SID: | 2030092 |
Source Port: | 45384 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23196.64.143.16540534802030092 08/01/22-21:44:13.022914 |
SID: | 2030092 |
Source Port: | 40534 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.241.89.4546482372152835222 08/01/22-21:43:09.348262 |
SID: | 2835222 |
Source Port: | 46482 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23103.242.144.20040196802030092 08/01/22-21:42:49.089656 |
SID: | 2030092 |
Source Port: | 40196 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.244.78.4646126372152835222 08/01/22-21:43:57.149586 |
SID: | 2835222 |
Source Port: | 46126 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23104.88.199.11558432802030092 08/01/22-21:44:25.667337 |
SID: | 2030092 |
Source Port: | 58432 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2324.70.42.10535196802030092 08/01/22-21:43:13.815866 |
SID: | 2030092 |
Source Port: | 35196 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.73.245.12549532802030092 08/01/22-21:43:13.833586 |
SID: | 2030092 |
Source Port: | 49532 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23147.30.195.17747832802030092 08/01/22-21:43:44.856497 |
SID: | 2030092 |
Source Port: | 47832 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23173.222.85.9740950802030092 08/01/22-21:43:53.686634 |
SID: | 2030092 |
Source Port: | 40950 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23154.93.140.12143798802030092 08/01/22-21:44:25.791662 |
SID: | 2030092 |
Source Port: | 43798 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.90.108.15848342802030092 08/01/22-21:43:23.264109 |
SID: | 2030092 |
Source Port: | 48342 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2396.9.49.17842754802030092 08/01/22-21:43:13.621932 |
SID: | 2030092 |
Source Port: | 42754 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2341.225.52.6740002802030092 08/01/22-21:43:42.245870 |
SID: | 2030092 |
Source Port: | 40002 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.85.157.9454890802030092 08/01/22-21:43:34.044957 |
SID: | 2030092 |
Source Port: | 54890 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23150.60.90.3536170802030092 08/01/22-21:43:17.351906 |
SID: | 2030092 |
Source Port: | 36170 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.61.229.2245116802030092 08/01/22-21:43:28.788607 |
SID: | 2030092 |
Source Port: | 45116 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2334.90.111.13837276802030092 08/01/22-21:44:05.668192 |
SID: | 2030092 |
Source Port: | 37276 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.172.203.22349662802030092 08/01/22-21:43:55.772797 |
SID: | 2030092 |
Source Port: | 49662 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.250.84.19342606372152835222 08/01/22-21:43:25.633028 |
SID: | 2835222 |
Source Port: | 42606 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2313.228.140.6146608802030092 08/01/22-21:43:27.037411 |
SID: | 2030092 |
Source Port: | 46608 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2363.41.209.16832786802030092 08/01/22-21:44:06.169594 |
SID: | 2030092 |
Source Port: | 32786 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.244.104.22857138372152835222 08/01/22-21:44:46.464996 |
SID: | 2835222 |
Source Port: | 57138 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23184.26.189.22842688802030092 08/01/22-21:44:22.077041 |
SID: | 2030092 |
Source Port: | 42688 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23120.76.130.13336072802030092 08/01/22-21:43:34.142788 |
SID: | 2030092 |
Source Port: | 36072 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.214.10.14350660802030092 08/01/22-21:43:10.521976 |
SID: | 2030092 |
Source Port: | 50660 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2317.252.12.10135512802030092 08/01/22-21:43:53.211070 |
SID: | 2030092 |
Source Port: | 35512 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2320.232.122.19833700802030092 08/01/22-21:43:23.295570 |
SID: | 2030092 |
Source Port: | 33700 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.241.124.9855108372152835222 08/01/22-21:44:20.865316 |
SID: | 2835222 |
Source Port: | 55108 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23156.245.57.1849768372152835222 08/01/22-21:44:21.145823 |
SID: | 2835222 |
Source Port: | 49768 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23156.244.120.5248676372152835222 08/01/22-21:44:16.869886 |
SID: | 2835222 |
Source Port: | 48676 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23197.2.90.9745204372152835222 08/01/22-21:44:03.696870 |
SID: | 2835222 |
Source Port: | 45204 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2342.193.105.4547736802030092 08/01/22-21:44:05.876360 |
SID: | 2030092 |
Source Port: | 47736 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23198.52.121.15137632802030092 08/01/22-21:43:24.067668 |
SID: | 2030092 |
Source Port: | 37632 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.247.23.11541334372152835222 08/01/22-21:44:46.156590 |
SID: | 2835222 |
Source Port: | 41334 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2320.188.8.16156622802030092 08/01/22-21:42:48.966425 |
SID: | 2030092 |
Source Port: | 56622 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23172.105.158.17258110802030092 08/01/22-21:44:29.690864 |
SID: | 2030092 |
Source Port: | 58110 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.2.129.937990802030092 08/01/22-21:42:50.045029 |
SID: | 2030092 |
Source Port: | 37990 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2341.62.155.6546748372152835222 08/01/22-21:43:55.207892 |
SID: | 2835222 |
Source Port: | 46748 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23156.241.68.2635384372152835222 08/01/22-21:42:49.050291 |
SID: | 2835222 |
Source Port: | 35384 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2397.107.126.17735232802030092 08/01/22-21:42:48.822073 |
SID: | 2030092 |
Source Port: | 35232 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23134.73.209.18750436802030092 08/01/22-21:44:18.774609 |
SID: | 2030092 |
Source Port: | 50436 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.252.181.25453466802030092 08/01/22-21:44:29.565194 |
SID: | 2030092 |
Source Port: | 53466 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23209.124.73.10544650802030092 08/01/22-21:43:44.869548 |
SID: | 2030092 |
Source Port: | 44650 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2372.12.115.7639362802030092 08/01/22-21:44:02.956606 |
SID: | 2030092 |
Source Port: | 39362 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.254.218.13153330802030092 08/01/22-21:43:58.483937 |
SID: | 2030092 |
Source Port: | 53330 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2392.222.9.7240470802030092 08/01/22-21:44:18.638636 |
SID: | 2030092 |
Source Port: | 40470 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2382.77.28.23248440802030092 08/01/22-21:43:33.500957 |
SID: | 2030092 |
Source Port: | 48440 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23141.11.216.9243202802030092 08/01/22-21:42:48.571167 |
SID: | 2030092 |
Source Port: | 43202 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.218.145.24553390802030092 08/01/22-21:43:47.958921 |
SID: | 2030092 |
Source Port: | 53390 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23194.34.163.5245456802030092 08/01/22-21:44:44.008803 |
SID: | 2030092 |
Source Port: | 45456 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23195.96.101.6843678802030092 08/01/22-21:43:06.536690 |
SID: | 2030092 |
Source Port: | 43678 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23122.13.3.22752324802030092 08/01/22-21:43:40.656163 |
SID: | 2030092 |
Source Port: | 52324 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.226.101.2657394372152835222 08/01/22-21:43:40.901086 |
SID: | 2835222 |
Source Port: | 57394 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2341.62.230.21960986372152835222 08/01/22-21:44:45.806612 |
SID: | 2835222 |
Source Port: | 60986 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23104.126.121.24735088802030092 08/01/22-21:42:48.603229 |
SID: | 2030092 |
Source Port: | 35088 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23180.81.177.3849326802030092 08/01/22-21:43:41.906641 |
SID: | 2030092 |
Source Port: | 49326 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23154.215.121.14854116802030092 08/01/22-21:43:44.641796 |
SID: | 2030092 |
Source Port: | 54116 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23195.93.174.5756388802030092 08/01/22-21:44:05.512366 |
SID: | 2030092 |
Source Port: | 56388 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.254.91.21538200372152835222 08/01/22-21:44:18.364443 |
SID: | 2835222 |
Source Port: | 38200 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2323.60.25.24248340802030092 08/01/22-21:43:33.945623 |
SID: | 2030092 |
Source Port: | 48340 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23154.221.185.4741918802030092 08/01/22-21:43:44.629528 |
SID: | 2030092 |
Source Port: | 41918 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23211.10.132.7135338802030092 08/01/22-21:44:10.140861 |
SID: | 2030092 |
Source Port: | 35338 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2368.185.99.20936264802030092 08/01/22-21:43:14.053682 |
SID: | 2030092 |
Source Port: | 36264 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2391.213.169.9452446802030092 08/01/22-21:44:05.544292 |
SID: | 2030092 |
Source Port: | 52446 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23212.114.117.9742896802030092 08/01/22-21:44:18.643624 |
SID: | 2030092 |
Source Port: | 42896 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23176.102.167.1655950802030092 08/01/22-21:44:00.023907 |
SID: | 2030092 |
Source Port: | 55950 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.254.93.3547972372152835222 08/01/22-21:44:21.808298 |
SID: | 2835222 |
Source Port: | 47972 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23156.241.140.552752802030092 08/01/22-21:44:34.951189 |
SID: | 2030092 |
Source Port: | 52752 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2395.68.0.22353180802030092 08/01/22-21:44:09.693750 |
SID: | 2030092 |
Source Port: | 53180 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.36.232.12241748802030092 08/01/22-21:44:28.291135 |
SID: | 2030092 |
Source Port: | 41748 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2365.109.9.18642346802030092 08/01/22-21:43:10.434225 |
SID: | 2030092 |
Source Port: | 42346 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23185.112.164.1344810802030092 08/01/22-21:43:44.482220 |
SID: | 2030092 |
Source Port: | 44810 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.60.213.17845130802030092 08/01/22-21:43:55.732889 |
SID: | 2030092 |
Source Port: | 45130 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2381.175.206.239200802030092 08/01/22-21:44:05.715994 |
SID: | 2030092 |
Source Port: | 39200 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23154.221.75.8645198802030092 08/01/22-21:44:09.979531 |
SID: | 2030092 |
Source Port: | 45198 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23123.30.133.738654802030092 08/01/22-21:43:34.193204 |
SID: | 2030092 |
Source Port: | 38654 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23103.80.237.2749950802030092 08/01/22-21:43:08.043637 |
SID: | 2030092 |
Source Port: | 49950 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23163.191.216.7556002802030092 08/01/22-21:43:23.323213 |
SID: | 2030092 |
Source Port: | 56002 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2374.81.189.15536332802030092 08/01/22-21:44:09.659673 |
SID: | 2030092 |
Source Port: | 36332 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2335.165.133.2656162802030092 08/01/22-21:44:05.677023 |
SID: | 2030092 |
Source Port: | 56162 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23190.80.198.10040982802030092 08/01/22-21:44:09.919578 |
SID: | 2030092 |
Source Port: | 40982 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.207.52.18557548802030092 08/01/22-21:43:20.983333 |
SID: | 2030092 |
Source Port: | 57548 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23185.63.189.5635972802030092 08/01/22-21:44:16.761120 |
SID: | 2030092 |
Source Port: | 35972 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23137.220.238.1533906802030092 08/01/22-21:44:30.019944 |
SID: | 2030092 |
Source Port: | 33906 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.226.76.10941850372152835222 08/01/22-21:42:48.763879 |
SID: | 2835222 |
Source Port: | 41850 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23104.92.64.10753456802030092 08/01/22-21:44:16.319433 |
SID: | 2030092 |
Source Port: | 53456 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2380.99.238.20757486802030092 08/01/22-21:43:30.847372 |
SID: | 2030092 |
Source Port: | 57486 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2318.176.154.2451384802030092 08/01/22-21:43:07.885044 |
SID: | 2030092 |
Source Port: | 51384 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.117.59.20943734802030092 08/01/22-21:43:30.978840 |
SID: | 2030092 |
Source Port: | 43734 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23116.77.74.11555738802030092 08/01/22-21:44:42.347320 |
SID: | 2030092 |
Source Port: | 55738 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.250.6.21043472372152835222 08/01/22-21:44:01.300264 |
SID: | 2835222 |
Source Port: | 43472 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2338.63.154.24959188802030092 08/01/22-21:44:00.092117 |
SID: | 2030092 |
Source Port: | 59188 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.118.243.7236792802030092 08/01/22-21:44:02.963840 |
SID: | 2030092 |
Source Port: | 36792 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23118.214.252.13249522802030092 08/01/22-21:44:44.498477 |
SID: | 2030092 |
Source Port: | 49522 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23183.91.15.12657370802030092 08/01/22-21:43:26.969218 |
SID: | 2030092 |
Source Port: | 57370 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23178.153.90.25358242802030092 08/01/22-21:43:30.964232 |
SID: | 2030092 |
Source Port: | 58242 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2395.84.189.12436876802030092 08/01/22-21:44:05.543993 |
SID: | 2030092 |
Source Port: | 36876 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2350.116.66.20433372802030092 08/01/22-21:42:50.050418 |
SID: | 2030092 |
Source Port: | 33372 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2331.133.94.9336426802030092 08/01/22-21:44:21.590009 |
SID: | 2030092 |
Source Port: | 36426 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23181.57.212.8943974802030092 08/01/22-21:44:31.940064 |
SID: | 2030092 |
Source Port: | 43974 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2377.255.204.6853480802030092 08/01/22-21:42:48.743745 |
SID: | 2030092 |
Source Port: | 53480 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2389.161.228.9448776802030092 08/01/22-21:43:30.846650 |
SID: | 2030092 |
Source Port: | 48776 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2391.220.244.458328802030092 08/01/22-21:43:26.519732 |
SID: | 2030092 |
Source Port: | 58328 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.60.7.2241804802030092 08/01/22-21:43:36.317877 |
SID: | 2030092 |
Source Port: | 41804 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.19.223.24144208802030092 08/01/22-21:43:13.640908 |
SID: | 2030092 |
Source Port: | 44208 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23117.50.168.22639528802030092 08/01/22-21:44:31.928263 |
SID: | 2030092 |
Source Port: | 39528 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2313.224.154.18234180802030092 08/01/22-21:43:24.104363 |
SID: | 2030092 |
Source Port: | 34180 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.215.238.16734206802030092 08/01/22-21:43:30.916623 |
SID: | 2030092 |
Source Port: | 34206 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.250.27.2441502372152835222 08/01/22-21:43:12.514025 |
SID: | 2835222 |
Source Port: | 41502 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23212.172.50.1740604802030092 08/01/22-21:44:03.376073 |
SID: | 2030092 |
Source Port: | 40604 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.237.140.23959606802030092 08/01/22-21:44:16.898248 |
SID: | 2030092 |
Source Port: | 59606 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23121.40.98.24545330802030092 08/01/22-21:43:44.927875 |
SID: | 2030092 |
Source Port: | 45330 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.14.118.21359880802030092 08/01/22-21:43:07.777997 |
SID: | 2030092 |
Source Port: | 59880 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23172.65.100.14342472802030092 08/01/22-21:44:15.400499 |
SID: | 2030092 |
Source Port: | 42472 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23170.76.157.19860910802030092 08/01/22-21:43:26.609889 |
SID: | 2030092 |
Source Port: | 60910 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.98.105.2050940802030092 08/01/22-21:43:18.947592 |
SID: | 2030092 |
Source Port: | 50940 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.232.20.107.17136314802030092 08/01/22-21:43:47.796989 |
SID: | 2030092 |
Source Port: | 36314 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23142.111.183.13957114802030092 08/01/22-21:43:58.416492 |
SID: | 2030092 |
Source Port: | 57114 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.200.17.3233276802030092 08/01/22-21:44:17.185518 |
SID: | 2030092 |
Source Port: | 33276 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.226.52.6442392372152835222 08/01/22-21:43:47.942473 |
SID: | 2835222 |
Source Port: | 42392 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2344.193.47.14238852802030092 08/01/22-21:44:13.077652 |
SID: | 2030092 |
Source Port: | 38852 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.238.56.14360294372152835222 08/01/22-21:43:38.304072 |
SID: | 2835222 |
Source Port: | 60294 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2346.35.243.15847348802030092 08/01/22-21:43:23.282685 |
SID: | 2030092 |
Source Port: | 47348 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2318.211.202.21436782802030092 08/01/22-21:43:26.616916 |
SID: | 2030092 |
Source Port: | 36782 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23154.86.82.9140504802030092 08/01/22-21:44:07.071797 |
SID: | 2030092 |
Source Port: | 40504 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23107.163.215.21037630802030092 08/01/22-21:43:44.997014 |
SID: | 2030092 |
Source Port: | 37630 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23161.35.62.23151606802030092 08/01/22-21:44:44.086282 |
SID: | 2030092 |
Source Port: | 51606 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23217.115.123.2347176802030092 08/01/22-21:43:44.490453 |
SID: | 2030092 |
Source Port: | 47176 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.226.74.3044708372152835222 08/01/22-21:44:42.169207 |
SID: | 2835222 |
Source Port: | 44708 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2320.223.119.24353354802030092 08/01/22-21:43:55.687500 |
SID: | 2030092 |
Source Port: | 53354 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.235.145.132.11655322802030092 08/01/22-21:43:30.869450 |
SID: | 2030092 |
Source Port: | 55322 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.0.133.4039984802030092 08/01/22-21:44:32.003739 |
SID: | 2030092 |
Source Port: | 39984 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.226.8.18747374372152835222 08/01/22-21:44:14.370650 |
SID: | 2835222 |
Source Port: | 47374 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2313.110.65.25540754802030092 08/01/22-21:43:47.748049 |
SID: | 2030092 |
Source Port: | 40754 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.35.239.18033952802030092 08/01/22-21:44:05.659752 |
SID: | 2030092 |
Source Port: | 33952 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23184.25.127.9240168802030092 08/01/22-21:43:10.511470 |
SID: | 2030092 |
Source Port: | 40168 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2391.235.177.1157588802030092 08/01/22-21:43:44.545831 |
SID: | 2030092 |
Source Port: | 57588 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23193.131.100.9235534802030092 08/01/22-21:43:28.784130 |
SID: | 2030092 |
Source Port: | 35534 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2335.86.129.10638530802030092 08/01/22-21:44:21.737046 |
SID: | 2030092 |
Source Port: | 38530 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23195.133.28.18345264802030092 08/01/22-21:42:49.764821 |
SID: | 2030092 |
Source Port: | 45264 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.244.79.20838632372152835222 08/01/22-21:44:46.235365 |
SID: | 2835222 |
Source Port: | 38632 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23103.48.18.5451242802030092 08/01/22-21:44:00.317486 |
SID: | 2030092 |
Source Port: | 51242 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23185.132.176.15651746802030092 08/01/22-21:43:28.814219 |
SID: | 2030092 |
Source Port: | 51746 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.46.254.22437444802030092 08/01/22-21:43:36.244524 |
SID: | 2030092 |
Source Port: | 37444 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.226.84.7036050372152835222 08/01/22-21:44:23.318691 |
SID: | 2835222 |
Source Port: | 36050 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23156.226.107.9559872372152835222 08/01/22-21:44:45.956761 |
SID: | 2835222 |
Source Port: | 59872 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23195.180.178.10447974802030092 08/01/22-21:44:41.782956 |
SID: | 2030092 |
Source Port: | 47974 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.250.26.19846122372152835222 08/01/22-21:44:43.167390 |
SID: | 2835222 |
Source Port: | 46122 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23220.248.110.16955974802030092 08/01/22-21:44:26.039044 |
SID: | 2030092 |
Source Port: | 55974 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23172.120.217.23059688802030092 08/01/22-21:43:20.844780 |
SID: | 2030092 |
Source Port: | 59688 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.65.225.4446022802030092 08/01/22-21:43:44.862784 |
SID: | 2030092 |
Source Port: | 46022 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2334.231.106.13050690802030092 08/01/22-21:43:49.757259 |
SID: | 2030092 |
Source Port: | 50690 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.74.184.12639116802030092 08/01/22-21:44:30.133361 |
SID: | 2030092 |
Source Port: | 39116 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23199.38.243.4342544802030092 08/01/22-21:44:06.890010 |
SID: | 2030092 |
Source Port: | 42544 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.232.23.99.22354330802030092 08/01/22-21:44:38.357677 |
SID: | 2030092 |
Source Port: | 54330 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.254.61.9838246372152835222 08/01/22-21:43:19.903932 |
SID: | 2835222 |
Source Port: | 38246 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2318.215.230.19633478802030092 08/01/22-21:43:34.052821 |
SID: | 2030092 |
Source Port: | 33478 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.226.119.22536030372152835222 08/01/22-21:43:55.441939 |
SID: | 2835222 |
Source Port: | 36030 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23203.253.43.2236278802030092 08/01/22-21:43:23.771120 |
SID: | 2030092 |
Source Port: | 36278 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23151.101.191.18150916802030092 08/01/22-21:44:05.946292 |
SID: | 2030092 |
Source Port: | 50916 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23154.212.164.11933258802030092 08/01/22-21:43:26.704125 |
SID: | 2030092 |
Source Port: | 33258 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.45.68.4654248802030092 08/01/22-21:43:10.705369 |
SID: | 2030092 |
Source Port: | 54248 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23123.207.79.6935580802030092 08/01/22-21:42:48.689280 |
SID: | 2030092 |
Source Port: | 35580 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.254.103.20358296372152835222 08/01/22-21:43:44.142532 |
SID: | 2835222 |
Source Port: | 58296 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2354.72.191.21460604802030092 08/01/22-21:43:46.722149 |
SID: | 2030092 |
Source Port: | 60604 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.250.28.22148562372152835222 08/01/22-21:44:14.162075 |
SID: | 2835222 |
Source Port: | 48562 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2387.121.144.10542384802030092 08/01/22-21:44:05.547154 |
SID: | 2030092 |
Source Port: | 42384 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23210.117.130.21947860802030092 08/01/22-21:42:50.245580 |
SID: | 2030092 |
Source Port: | 47860 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2334.111.24.12544010802030092 08/01/22-21:43:36.263359 |
SID: | 2030092 |
Source Port: | 44010 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23220.94.136.21354990802030092 08/01/22-21:43:54.359265 |
SID: | 2030092 |
Source Port: | 54990 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2382.81.37.1158278802030092 08/01/22-21:44:31.813099 |
SID: | 2030092 |
Source Port: | 58278 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23107.151.220.1137538802030092 08/01/22-21:43:53.533468 |
SID: | 2030092 |
Source Port: | 37538 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.240.109.559058372152835222 08/01/22-21:42:53.946676 |
SID: | 2835222 |
Source Port: | 59058 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2340.117.121.7240538802030092 08/01/22-21:44:34.641425 |
SID: | 2030092 |
Source Port: | 40538 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23185.40.121.9136580802030092 08/01/22-21:43:23.287003 |
SID: | 2030092 |
Source Port: | 36580 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23113.165.166.24752718802030092 08/01/22-21:43:36.954345 |
SID: | 2030092 |
Source Port: | 52718 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23158.175.189.7346624802030092 08/01/22-21:43:59.731313 |
SID: | 2030092 |
Source Port: | 46624 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23206.119.101.6748042802030092 08/01/22-21:44:29.470174 |
SID: | 2030092 |
Source Port: | 48042 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2354.162.49.2557456802030092 08/01/22-21:43:44.587199 |
SID: | 2030092 |
Source Port: | 57456 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.16.1.16354128802030092 08/01/22-21:44:21.563331 |
SID: | 2030092 |
Source Port: | 54128 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2345.61.232.17738678802030092 08/01/22-21:44:25.976969 |
SID: | 2030092 |
Source Port: | 38678 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2345.196.97.24951026802030092 08/01/22-21:44:18.805457 |
SID: | 2030092 |
Source Port: | 51026 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23152.174.163.17347700802030092 08/01/22-21:44:37.865384 |
SID: | 2030092 |
Source Port: | 47700 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2364.111.117.5159460802030092 08/01/22-21:43:13.727126 |
SID: | 2030092 |
Source Port: | 59460 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23103.253.239.4135418802030092 08/01/22-21:43:58.316623 |
SID: | 2030092 |
Source Port: | 35418 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23184.51.86.21742104802030092 08/01/22-21:43:44.657772 |
SID: | 2030092 |
Source Port: | 42104 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2344.239.193.11236818802030092 08/01/22-21:43:26.498254 |
SID: | 2030092 |
Source Port: | 36818 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23190.249.244.24437956802030092 08/01/22-21:43:49.815329 |
SID: | 2030092 |
Source Port: | 37956 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23185.255.177.25048878802030092 08/01/22-21:43:18.727711 |
SID: | 2030092 |
Source Port: | 48878 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2385.10.245.15445824802030092 08/01/22-21:44:18.640064 |
SID: | 2030092 |
Source Port: | 45824 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23143.248.0.21357340802030092 08/01/22-21:43:14.141226 |
SID: | 2030092 |
Source Port: | 57340 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23107.154.128.17241898802030092 08/01/22-21:44:02.679948 |
SID: | 2030092 |
Source Port: | 41898 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2347.105.74.2552202802030092 08/01/22-21:44:02.504627 |
SID: | 2030092 |
Source Port: | 52202 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23119.192.225.3449096802030092 08/01/22-21:43:07.901737 |
SID: | 2030092 |
Source Port: | 49096 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23207.204.0.21440984802030092 08/01/22-21:43:47.916757 |
SID: | 2030092 |
Source Port: | 40984 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23172.255.118.1857332802030092 08/01/22-21:43:54.084111 |
SID: | 2030092 |
Source Port: | 57332 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23113.31.157.15835586802030092 08/01/22-21:44:34.774041 |
SID: | 2030092 |
Source Port: | 35586 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.8.6.4640516802030092 08/01/22-21:43:47.823140 |
SID: | 2030092 |
Source Port: | 40516 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2335.170.247.137012802030092 08/01/22-21:43:34.052698 |
SID: | 2030092 |
Source Port: | 37012 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23153.185.205.7960920802030092 08/01/22-21:42:50.296544 |
SID: | 2030092 |
Source Port: | 60920 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2359.2.243.7953502802030092 08/01/22-21:43:48.235023 |
SID: | 2030092 |
Source Port: | 53502 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2345.60.14.2459126802030092 08/01/22-21:43:47.669413 |
SID: | 2030092 |
Source Port: | 59126 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.225.136.23856826372152835222 08/01/22-21:44:23.298910 |
SID: | 2835222 |
Source Port: | 56826 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23217.5.169.23441420802030092 08/01/22-21:44:05.533640 |
SID: | 2030092 |
Source Port: | 41420 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.192.112.3551112802030092 08/01/22-21:43:48.155745 |
SID: | 2030092 |
Source Port: | 51112 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.49.134.1435214802030092 08/01/22-21:43:45.014943 |
SID: | 2030092 |
Source Port: | 35214 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2313.224.165.14046566802030092 08/01/22-21:43:24.089366 |
SID: | 2030092 |
Source Port: | 46566 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2389.232.105.7853870802030092 08/01/22-21:43:40.802403 |
SID: | 2030092 |
Source Port: | 53870 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.72.21.19852344802030092 08/01/22-21:44:18.880468 |
SID: | 2030092 |
Source Port: | 52344 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23121.199.70.3660276802030092 08/01/22-21:44:15.768170 |
SID: | 2030092 |
Source Port: | 60276 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23116.177.252.1341922802030092 08/01/22-21:44:17.309762 |
SID: | 2030092 |
Source Port: | 41922 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23193.54.7.18043996802030092 08/01/22-21:43:59.765172 |
SID: | 2030092 |
Source Port: | 43996 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.193.118.22653396802030092 08/01/22-21:43:40.564426 |
SID: | 2030092 |
Source Port: | 53396 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.83.184.22037058802030092 08/01/22-21:44:46.042141 |
SID: | 2030092 |
Source Port: | 37058 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2341.222.234.17336600802030092 08/01/22-21:44:41.338931 |
SID: | 2030092 |
Source Port: | 36600 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.96.187.12638038802030092 08/01/22-21:44:09.668786 |
SID: | 2030092 |
Source Port: | 38038 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23120.48.103.15436534802030092 08/01/22-21:43:36.975850 |
SID: | 2030092 |
Source Port: | 36534 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2354.157.114.17142444802030092 08/01/22-21:43:40.477946 |
SID: | 2030092 |
Source Port: | 42444 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.244.89.19133564372152835222 08/01/22-21:43:43.834159 |
SID: | 2835222 |
Source Port: | 33564 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23154.92.15.7943804802030092 08/01/22-21:44:03.053824 |
SID: | 2030092 |
Source Port: | 43804 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2343.230.160.6846376802030092 08/01/22-21:43:41.896442 |
SID: | 2030092 |
Source Port: | 46376 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2398.143.215.5152676802030092 08/01/22-21:43:23.516259 |
SID: | 2030092 |
Source Port: | 52676 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.234.4.86.2743062802030092 08/01/22-21:44:31.877948 |
SID: | 2030092 |
Source Port: | 43062 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.241.11.5447360372152835222 08/01/22-21:44:34.826684 |
SID: | 2835222 |
Source Port: | 47360 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2320.124.113.10539194802030092 08/01/22-21:43:23.295730 |
SID: | 2030092 |
Source Port: | 39194 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2313.33.150.17339658802030092 08/01/22-21:44:29.970773 |
SID: | 2030092 |
Source Port: | 39658 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2340.88.204.21545798802030092 08/01/22-21:43:07.848907 |
SID: | 2030092 |
Source Port: | 45798 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2389.161.150.23555456802030092 08/01/22-21:43:53.754204 |
SID: | 2030092 |
Source Port: | 55456 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23192.185.126.8836830802030092 08/01/22-21:43:23.500856 |
SID: | 2030092 |
Source Port: | 36830 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23197.25.211.14756036802030092 08/01/22-21:43:40.423176 |
SID: | 2030092 |
Source Port: | 56036 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2341.78.123.650424372152835222 08/01/22-21:44:10.499745 |
SID: | 2835222 |
Source Port: | 50424 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2351.15.121.3633740802030092 08/01/22-21:43:33.470642 |
SID: | 2030092 |
Source Port: | 33740 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23193.197.180.2646264802030092 08/01/22-21:44:21.569304 |
SID: | 2030092 |
Source Port: | 46264 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2363.32.89.13043568802030092 08/01/22-21:43:16.976076 |
SID: | 2030092 |
Source Port: | 43568 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2343.229.113.8739428802030092 08/01/22-21:43:45.103851 |
SID: | 2030092 |
Source Port: | 39428 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23147.47.159.23944384802030092 08/01/22-21:44:37.620643 |
SID: | 2030092 |
Source Port: | 44384 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23216.228.236.18945606802030092 08/01/22-21:44:31.864692 |
SID: | 2030092 |
Source Port: | 45606 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.40.2.16948162802030092 08/01/22-21:44:00.090210 |
SID: | 2030092 |
Source Port: | 48162 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2389.185.42.25343956802030092 08/01/22-21:43:18.678710 |
SID: | 2030092 |
Source Port: | 43956 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2391.126.206.17657054802030092 08/01/22-21:42:54.068145 |
SID: | 2030092 |
Source Port: | 57054 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23180.129.15.2533144802030092 08/01/22-21:44:02.827751 |
SID: | 2030092 |
Source Port: | 33144 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.224.19.3042194372152835222 08/01/22-21:44:38.378335 |
SID: | 2835222 |
Source Port: | 42194 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2327.238.51.16241912802030092 08/01/22-21:43:11.198242 |
SID: | 2030092 |
Source Port: | 41912 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.124.254.20356666802030092 08/01/22-21:44:10.159090 |
SID: | 2030092 |
Source Port: | 56666 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.227.244.23040412372152835222 08/01/22-21:44:34.811302 |
SID: | 2835222 |
Source Port: | 40412 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2352.47.161.20841736802030092 08/01/22-21:42:58.371772 |
SID: | 2030092 |
Source Port: | 41736 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23184.84.198.8333530802030092 08/01/22-21:44:22.185028 |
SID: | 2030092 |
Source Port: | 33530 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23189.234.16.3938890802030092 08/01/22-21:43:10.567147 |
SID: | 2030092 |
Source Port: | 38890 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2318.66.32.11240356802030092 08/01/22-21:43:26.478055 |
SID: | 2030092 |
Source Port: | 40356 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.241.124.11752536372152835222 08/01/22-21:43:31.553910 |
SID: | 2835222 |
Source Port: | 52536 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2354.230.158.16655870802030092 08/01/22-21:43:59.769959 |
SID: | 2030092 |
Source Port: | 55870 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23103.26.96.733242802030092 08/01/22-21:43:07.771780 |
SID: | 2030092 |
Source Port: | 33242 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2390.102.102.16535702802030092 08/01/22-21:43:16.971387 |
SID: | 2030092 |
Source Port: | 35702 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.140.164.2746172802030092 08/01/22-21:43:40.498202 |
SID: | 2030092 |
Source Port: | 46172 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2350.246.96.21752938802030092 08/01/22-21:43:47.918312 |
SID: | 2030092 |
Source Port: | 52938 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.246.214.11435198802030092 08/01/22-21:43:59.866289 |
SID: | 2030092 |
Source Port: | 35198 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.254.48.14245748372152835222 08/01/22-21:43:57.324717 |
SID: | 2835222 |
Source Port: | 45748 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2334.151.109.23235362802030092 08/01/22-21:44:16.494845 |
SID: | 2030092 |
Source Port: | 35362 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2370.130.195.335678802030092 08/01/22-21:44:05.665995 |
SID: | 2030092 |
Source Port: | 35678 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.217.210.21943778802030092 08/01/22-21:43:36.534720 |
SID: | 2030092 |
Source Port: | 43778 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23162.243.139.12040334802030092 08/01/22-21:44:16.977047 |
SID: | 2030092 |
Source Port: | 40334 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.38.247.19949426802030092 08/01/22-21:43:13.787120 |
SID: | 2030092 |
Source Port: | 49426 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23107.175.187.24734612802030092 08/01/22-21:44:03.106277 |
SID: | 2030092 |
Source Port: | 34612 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23185.248.15.19358188802030092 08/01/22-21:44:15.382737 |
SID: | 2030092 |
Source Port: | 58188 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23202.179.159.21735500802030092 08/01/22-21:43:26.674072 |
SID: | 2030092 |
Source Port: | 35500 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23121.133.107.1749692802030092 08/01/22-21:44:12.962172 |
SID: | 2030092 |
Source Port: | 49692 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2334.234.115.842408802030092 08/01/22-21:44:25.749470 |
SID: | 2030092 |
Source Port: | 42408 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23172.74.6.8551746802030092 08/01/22-21:44:21.899744 |
SID: | 2030092 |
Source Port: | 51746 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2388.225.241.21349058802030092 08/01/22-21:44:25.609626 |
SID: | 2030092 |
Source Port: | 49058 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2339.107.79.23955776802030092 08/01/22-21:43:10.744102 |
SID: | 2030092 |
Source Port: | 55776 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23201.208.3.10160606802030092 08/01/22-21:44:47.894558 |
SID: | 2030092 |
Source Port: | 60606 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23139.196.197.947172802030092 08/01/22-21:43:26.731152 |
SID: | 2030092 |
Source Port: | 47172 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.164.147.16643234802030092 08/01/22-21:43:58.248137 |
SID: | 2030092 |
Source Port: | 43234 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23213.148.74.845906802030092 08/01/22-21:44:06.836824 |
SID: | 2030092 |
Source Port: | 45906 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2339.130.136.14137024802030092 08/01/22-21:44:46.389635 |
SID: | 2030092 |
Source Port: | 37024 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23184.27.36.12139014802030092 08/01/22-21:43:21.010470 |
SID: | 2030092 |
Source Port: | 39014 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23222.118.130.10632926802030092 08/01/22-21:43:36.491786 |
SID: | 2030092 |
Source Port: | 32926 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.235.69.148.17750454802030092 08/01/22-21:44:31.801404 |
SID: | 2030092 |
Source Port: | 50454 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.48.146.8852364802030092 08/01/22-21:43:47.795467 |
SID: | 2030092 |
Source Port: | 52364 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2386.183.84.14254248802030092 08/01/22-21:44:16.753195 |
SID: | 2030092 |
Source Port: | 54248 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.254.54.7553622372152835222 08/01/22-21:42:53.549246 |
SID: | 2835222 |
Source Port: | 53622 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2381.145.130.12141860802030092 08/01/22-21:43:26.512483 |
SID: | 2030092 |
Source Port: | 41860 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23194.247.141.1150196802030092 08/01/22-21:43:36.746882 |
SID: | 2030092 |
Source Port: | 50196 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.226.94.850096802030092 08/01/22-21:44:16.399057 |
SID: | 2030092 |
Source Port: | 50096 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23154.91.101.9141918802030092 08/01/22-21:44:46.237786 |
SID: | 2030092 |
Source Port: | 41918 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23103.139.77.5155564802030092 08/01/22-21:43:07.956990 |
SID: | 2030092 |
Source Port: | 55564 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23108.167.165.10134258802030092 08/01/22-21:43:40.938754 |
SID: | 2030092 |
Source Port: | 34258 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2347.101.68.1938314802030092 08/01/22-21:44:15.548998 |
SID: | 2030092 |
Source Port: | 38314 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.226.109.12043200372152835222 08/01/22-21:44:09.427006 |
SID: | 2835222 |
Source Port: | 43200 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2313.113.185.5746690802030092 08/01/22-21:44:12.939382 |
SID: | 2030092 |
Source Port: | 46690 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23203.252.60.648018802030092 08/01/22-21:44:18.043956 |
SID: | 2030092 |
Source Port: | 48018 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.250.79.22657050372152835222 08/01/22-21:44:08.838546 |
SID: | 2835222 |
Source Port: | 57050 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23147.135.174.2548784802030092 08/01/22-21:43:53.238475 |
SID: | 2030092 |
Source Port: | 48784 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.250.113.23736188372152835222 08/01/22-21:43:43.531613 |
SID: | 2835222 |
Source Port: | 36188 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2354.243.216.21254738802030092 08/01/22-21:43:59.836396 |
SID: | 2030092 |
Source Port: | 54738 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.244.81.8143806372152835222 08/01/22-21:43:51.424263 |
SID: | 2835222 |
Source Port: | 43806 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23134.122.208.25135278802030092 08/01/22-21:44:38.127267 |
SID: | 2030092 |
Source Port: | 35278 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.240.107.1546358372152835222 08/01/22-21:44:45.675457 |
SID: | 2835222 |
Source Port: | 46358 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23213.144.239.11747378802030092 08/01/22-21:44:31.766005 |
SID: | 2030092 |
Source Port: | 47378 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2335.170.80.6849690802030092 08/01/22-21:44:37.498071 |
SID: | 2030092 |
Source Port: | 49690 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2337.251.143.19332830802030092 08/01/22-21:43:23.241081 |
SID: | 2030092 |
Source Port: | 32830 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2380.191.212.16040200802030092 08/01/22-21:44:34.919893 |
SID: | 2030092 |
Source Port: | 40200 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2367.227.191.12437450802030092 08/01/22-21:43:31.077825 |
SID: | 2030092 |
Source Port: | 37450 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.224.10.1235870372152835222 08/01/22-21:44:40.459826 |
SID: | 2835222 |
Source Port: | 35870 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2382.97.226.13359256802030092 08/01/22-21:43:44.484495 |
SID: | 2030092 |
Source Port: | 59256 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23107.179.52.4935544802030092 08/01/22-21:44:06.996555 |
SID: | 2030092 |
Source Port: | 35544 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2335.75.18.639472802030092 08/01/22-21:44:46.359535 |
SID: | 2030092 |
Source Port: | 39472 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23162.155.4.22259538802030092 08/01/22-21:43:28.926216 |
SID: | 2030092 |
Source Port: | 59538 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.32.9.24554762802030092 08/01/22-21:43:07.771909 |
SID: | 2030092 |
Source Port: | 54762 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.224.18.22138842372152835222 08/01/22-21:44:28.389349 |
SID: | 2835222 |
Source Port: | 38842 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23107.4.175.6844518802030092 08/01/22-21:44:32.076250 |
SID: | 2030092 |
Source Port: | 44518 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.245.54.6248046372152835222 08/01/22-21:44:13.564791 |
SID: | 2835222 |
Source Port: | 48046 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2399.86.27.19860522802030092 08/01/22-21:44:16.188964 |
SID: | 2030092 |
Source Port: | 60522 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2335.236.11.6933474802030092 08/01/22-21:44:29.874936 |
SID: | 2030092 |
Source Port: | 33474 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23188.42.62.4446678802030092 08/01/22-21:44:28.273925 |
SID: | 2030092 |
Source Port: | 46678 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23142.91.141.4044950802030092 08/01/22-21:43:44.617725 |
SID: | 2030092 |
Source Port: | 44950 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23121.95.161.9148552802030092 08/01/22-21:43:45.202210 |
SID: | 2030092 |
Source Port: | 48552 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.244.117.20653530372152835222 08/01/22-21:43:57.123337 |
SID: | 2835222 |
Source Port: | 53530 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2323.73.203.18233738802030092 08/01/22-21:44:43.862589 |
SID: | 2030092 |
Source Port: | 33738 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2335.227.228.14138064802030092 08/01/22-21:44:25.630193 |
SID: | 2030092 |
Source Port: | 38064 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23222.79.76.22436816802030092 08/01/22-21:43:47.898250 |
SID: | 2030092 |
Source Port: | 36816 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23129.24.35.5641238802030092 08/01/22-21:44:42.989075 |
SID: | 2030092 |
Source Port: | 41238 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23186.5.114.13236160802030092 08/01/22-21:43:40.531894 |
SID: | 2030092 |
Source Port: | 36160 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23220.149.115.19056176802030092 08/01/22-21:43:17.344737 |
SID: | 2030092 |
Source Port: | 56176 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2341.248.59.647014372152835222 08/01/22-21:43:40.419879 |
SID: | 2835222 |
Source Port: | 47014 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23202.41.160.18850404802030092 08/01/22-21:44:07.089693 |
SID: | 2030092 |
Source Port: | 50404 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23185.87.150.2551832802030092 08/01/22-21:43:07.746551 |
SID: | 2030092 |
Source Port: | 51832 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2341.194.192.4638250802030092 08/01/22-21:44:09.699455 |
SID: | 2030092 |
Source Port: | 38250 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23120.79.123.3849510802030092 08/01/22-21:43:40.572984 |
SID: | 2030092 |
Source Port: | 49510 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.250.67.12445184372152835222 08/01/22-21:44:13.559943 |
SID: | 2835222 |
Source Port: | 45184 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2362.244.40.12851670802030092 08/01/22-21:43:06.578444 |
SID: | 2030092 |
Source Port: | 51670 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.81.19.11642558802030092 08/01/22-21:44:06.991564 |
SID: | 2030092 |
Source Port: | 42558 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2391.202.54.21340358802030092 08/01/22-21:44:34.619453 |
SID: | 2030092 |
Source Port: | 40358 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2347.74.58.10850878802030092 08/01/22-21:43:36.834270 |
SID: | 2030092 |
Source Port: | 50878 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.47.252.13455442802030092 08/01/22-21:44:21.907795 |
SID: | 2030092 |
Source Port: | 55442 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23212.146.109.21547930802030092 08/01/22-21:43:14.536194 |
SID: | 2030092 |
Source Port: | 47930 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23198.102.221.14960764802030092 08/01/22-21:43:16.928793 |
SID: | 2030092 |
Source Port: | 60764 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.54.73.16041872802030092 08/01/22-21:43:49.896827 |
SID: | 2030092 |
Source Port: | 41872 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2361.184.202.4456976802030092 08/01/22-21:43:36.446269 |
SID: | 2030092 |
Source Port: | 56976 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2395.165.231.13451670802030092 08/01/22-21:43:36.323592 |
SID: | 2030092 |
Source Port: | 51670 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2334.96.107.8937652802030092 08/01/22-21:43:06.493600 |
SID: | 2030092 |
Source Port: | 37652 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23122.179.135.9735094802030092 08/01/22-21:43:13.653729 |
SID: | 2030092 |
Source Port: | 35094 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23204.68.93.23059748802030092 08/01/22-21:43:55.905481 |
SID: | 2030092 |
Source Port: | 59748 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23202.51.74.9452772802030092 08/01/22-21:44:16.508021 |
SID: | 2030092 |
Source Port: | 52772 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23154.91.150.21758822802030092 08/01/22-21:43:36.626243 |
SID: | 2030092 |
Source Port: | 58822 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.226.8.4833350372152835222 08/01/22-21:44:46.156695 |
SID: | 2835222 |
Source Port: | 33350 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23104.75.249.438606802030092 08/01/22-21:44:18.914710 |
SID: | 2030092 |
Source Port: | 38606 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23122.116.212.20560998802030092 08/01/22-21:43:10.666614 |
SID: | 2030092 |
Source Port: | 60998 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23172.98.196.4335462802030092 08/01/22-21:43:34.041582 |
SID: | 2030092 |
Source Port: | 35462 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23108.138.236.17542606802030092 08/01/22-21:44:28.278261 |
SID: | 2030092 |
Source Port: | 42606 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23184.28.230.6348914802030092 08/01/22-21:44:05.943171 |
SID: | 2030092 |
Source Port: | 48914 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23107.165.250.22148000802030092 08/01/22-21:43:23.528322 |
SID: | 2030092 |
Source Port: | 48000 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2349.212.143.24335626802030092 08/01/22-21:43:53.820062 |
SID: | 2030092 |
Source Port: | 35626 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23172.74.6.8552178802030092 08/01/22-21:44:31.721474 |
SID: | 2030092 |
Source Port: | 52178 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.245.49.3447524372152835222 08/01/22-21:43:09.063951 |
SID: | 2835222 |
Source Port: | 47524 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23217.7.99.23760146802030092 08/01/22-21:43:46.648966 |
SID: | 2030092 |
Source Port: | 60146 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.238.52.23152052372152835222 08/01/22-21:44:35.179228 |
SID: | 2835222 |
Source Port: | 52052 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2338.34.229.13444914802030092 08/01/22-21:43:44.617825 |
SID: | 2030092 |
Source Port: | 44914 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23188.40.111.4454842802030092 08/01/22-21:43:40.362674 |
SID: | 2030092 |
Source Port: | 54842 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.57.1.14244920802030092 08/01/22-21:44:09.873549 |
SID: | 2030092 |
Source Port: | 44920 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2381.196.169.9136996802030092 08/01/22-21:43:16.972182 |
SID: | 2030092 |
Source Port: | 36996 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23149.210.243.1343216802030092 08/01/22-21:42:54.095476 |
SID: | 2030092 |
Source Port: | 43216 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23189.113.72.4657030802030092 08/01/22-21:44:47.911258 |
SID: | 2030092 |
Source Port: | 57030 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2367.23.235.21060490802030092 08/01/22-21:43:53.305954 |
SID: | 2030092 |
Source Port: | 60490 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23114.35.34.8948302802030092 08/01/22-21:44:32.264635 |
SID: | 2030092 |
Source Port: | 48302 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23148.231.218.10451604802030092 08/01/22-21:44:10.108449 |
SID: | 2030092 |
Source Port: | 51604 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.122.153.15460080802030092 08/01/22-21:43:13.778634 |
SID: | 2030092 |
Source Port: | 60080 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.12.203.8851432802030092 08/01/22-21:44:30.275381 |
SID: | 2030092 |
Source Port: | 51432 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.56.147.13256536802030092 08/01/22-21:44:05.836930 |
SID: | 2030092 |
Source Port: | 56536 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.197.56.19557502802030092 08/01/22-21:43:29.089811 |
SID: | 2030092 |
Source Port: | 57502 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23138.100.208.8042014802030092 08/01/22-21:43:49.654620 |
SID: | 2030092 |
Source Port: | 42014 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2394.130.139.9748598802030092 08/01/22-21:44:16.023607 |
SID: | 2030092 |
Source Port: | 48598 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2318.200.223.24651684802030092 08/01/22-21:44:28.333703 |
SID: | 2030092 |
Source Port: | 51684 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2391.250.81.6042968802030092 08/01/22-21:43:47.672171 |
SID: | 2030092 |
Source Port: | 42968 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2354.68.102.1233778802030092 08/01/22-21:44:38.016691 |
SID: | 2030092 |
Source Port: | 33778 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2368.185.99.20937114802030092 08/01/22-21:43:28.923125 |
SID: | 2030092 |
Source Port: | 37114 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.225.159.20138000372152835222 08/01/22-21:44:45.463480 |
SID: | 2835222 |
Source Port: | 38000 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2368.151.234.8843420802030092 08/01/22-21:44:16.159255 |
SID: | 2030092 |
Source Port: | 43420 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23173.223.242.24949542802030092 08/01/22-21:43:44.756205 |
SID: | 2030092 |
Source Port: | 49542 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2343.130.226.17251302802030092 08/01/22-21:44:12.990342 |
SID: | 2030092 |
Source Port: | 51302 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
- • AV Detection
- • Networking
- • System Summary
- • Persistence and Installation Behavior
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Stealing of Sensitive Information
- • Remote Access Functionality
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Networking |
---|
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | Socket: | Jump to behavior |
Source: | HTTP traffic detected: |