Linux
Analysis Report
RGOazcS8sn.elf
Overview
General Information
Detection
Gafgyt, Mirai
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Signatures
Yara detected Mirai
Multi AV Scanner detection for submitted file
Yara detected Gafgyt
Malicious sample detected (through community Yara rule)
Snort IDS alert for network traffic
Connects to many ports of the same IP (likely port scanning)
Uses known network protocols on non-standard ports
Sample tries to kill multiple processes (SIGKILL)
Yara signature match
Uses the "uname" system call to query kernel version information (possible evasion)
Enumerates processes within the "proc" file system
Detected TCP or UDP traffic on non-standard ports
Sample listens on a socket
Sample tries to kill a process (SIGKILL)
Sample has stripped symbol table
HTTP GET or POST without a user agent
Sample contains strings indicative of BusyBox which embeds multiple Unix commands in a single executable
Classification
Analysis Advice
Some HTTP requests failed (404). It is likely that the sample will exhibit less behavior. |
Static ELF header machine description suggests that the sample might not execute correctly on this machine. |
Joe Sandbox Version: | 37.0.0 Beryl |
Analysis ID: | 820290 |
Start date and time: | 2023-03-05 19:26:56 +01:00 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 5m 33s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultlinuxfilecookbook.jbs |
Analysis system description: | Ubuntu Linux 20.04 x64 (Kernel 5.4.0-72, Firefox 91.0, Evince Document Viewer 3.36.10, LibreOffice 6.4.7.2, OpenJDK 11.0.11) |
Analysis Mode: | default |
Sample file name: | RGOazcS8sn.elf |
Original Sample Name: | 571ced95085d0474f12b4ee24e74a282.elf |
Detection: | MAL |
Classification: | mal100.spre.troj.linELF@0/0@1/0 |
- Report size exceeded maximum capacity and may have missing network information.
Command: | /tmp/RGOazcS8sn.elf |
PID: | 6227 |
Exit Code: | 0 |
Exit Code Info: | |
Killed: | False |
Standard Output: | unstable_is_the_history_of_universe |
Standard Error: |
- system is lnxubuntu20
- RGOazcS8sn.elf New Fork (PID: 6229, Parent: 6227)
- RGOazcS8sn.elf New Fork (PID: 6231, Parent: 6229)
- RGOazcS8sn.elf New Fork (PID: 6232, Parent: 6229)
- RGOazcS8sn.elf New Fork (PID: 6235, Parent: 6229)
- RGOazcS8sn.elf New Fork (PID: 6237, Parent: 6229)
- RGOazcS8sn.elf New Fork (PID: 6240, Parent: 6229)
- RGOazcS8sn.elf New Fork (PID: 6241, Parent: 6229)
- xfce4-panel New Fork (PID: 6247, Parent: 2063)
- xfce4-panel New Fork (PID: 6248, Parent: 2063)
- xfce4-panel New Fork (PID: 6249, Parent: 2063)
- xfce4-panel New Fork (PID: 6250, Parent: 2063)
- xfce4-panel New Fork (PID: 6251, Parent: 2063)
- xfce4-panel New Fork (PID: 6252, Parent: 2063)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Bashlite, Gafgyt | Bashlite is a malware family which infects Linux systems in order to launch distributed denial-of-service attacks (DDoS). Originally it was also known under the name Bashdoor, but this term now refers to the exploit method used by the malware. It has been used to launch attacks of up to 400 Gbps. | No Attribution |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Mirai | Mirai is one of the first significant botnets targeting exposed networking devices running Linux. Found in August 2016 by MalwareMustDie, its name means "future" in Japanese. Nowadays it targets a wide range of networked embedded devices such as IP cameras, home routers (many vendors involved), and other IoT devices. Since the source code was published on "Hack Forums" many variants of the Mirai family appeared, infecting mostly home networks all around the world. | No Attribution |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
SUSP_XORed_Mozilla | Detects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key. | Florian Roth (Nextron Systems) |
| |
MAL_ELF_LNX_Mirai_Oct10_1 | Detects ELF Mirai variant | Florian Roth (Nextron Systems) |
| |
JoeSecurity_Mirai_8 | Yara detected Mirai | Joe Security | ||
JoeSecurity_Gafgyt | Yara detected Gafgyt | Joe Security | ||
Linux_Trojan_Gafgyt_ea92cca8 | unknown | unknown |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Mirai_12 | Yara detected Mirai | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
SUSP_XORed_Mozilla | Detects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key. | Florian Roth (Nextron Systems) |
| |
SUSP_XORed_Mozilla | Detects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key. | Florian Roth (Nextron Systems) |
| |
SUSP_XORed_Mozilla | Detects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key. | Florian Roth (Nextron Systems) |
| |
MAL_ELF_LNX_Mirai_Oct10_1 | Detects ELF Mirai variant | Florian Roth (Nextron Systems) |
| |
JoeSecurity_Mirai_8 | Yara detected Mirai | Joe Security | ||
Click to see the 11 entries |
Timestamp: | 192.168.2.23104.104.119.23637442802030092 03/05/23-19:27:43.671967 |
SID: | 2030092 |
Source Port: | 37442 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23207.174.214.8255710802030092 03/05/23-19:28:44.978417 |
SID: | 2030092 |
Source Port: | 55710 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2341.152.164.9058744372152835222 03/05/23-19:27:57.088655 |
SID: | 2835222 |
Source Port: | 58744 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23120.25.84.23735640802030092 03/05/23-19:29:21.175351 |
SID: | 2030092 |
Source Port: | 35640 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.63.42.15960516802030092 03/05/23-19:28:02.952096 |
SID: | 2030092 |
Source Port: | 60516 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2362.166.252.1960300802030092 03/05/23-19:29:02.741178 |
SID: | 2030092 |
Source Port: | 60300 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2354.253.167.13635488802030092 03/05/23-19:29:05.210755 |
SID: | 2030092 |
Source Port: | 35488 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.254.106.8845004372152835222 03/05/23-19:28:53.332719 |
SID: | 2835222 |
Source Port: | 45004 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2347.107.106.8436058802030092 03/05/23-19:27:44.050116 |
SID: | 2030092 |
Source Port: | 36058 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.24.140.9241224802030092 03/05/23-19:27:59.702482 |
SID: | 2030092 |
Source Port: | 41224 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2369.234.246.1037196802030092 03/05/23-19:28:37.103753 |
SID: | 2030092 |
Source Port: | 37196 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.214.160.2258792802030092 03/05/23-19:27:50.621037 |
SID: | 2030092 |
Source Port: | 58792 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2354.196.73.24942752802030092 03/05/23-19:28:22.632816 |
SID: | 2030092 |
Source Port: | 42752 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.166.151.12137276372152835222 03/05/23-19:28:35.702026 |
SID: | 2835222 |
Source Port: | 37276 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2352.17.81.13636570802030092 03/05/23-19:28:04.755033 |
SID: | 2030092 |
Source Port: | 36570 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23138.68.20.13546656802030092 03/05/23-19:28:33.784417 |
SID: | 2030092 |
Source Port: | 46656 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.41.123.4152834802030092 03/05/23-19:28:17.025136 |
SID: | 2030092 |
Source Port: | 52834 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2372.240.148.6042312802030092 03/05/23-19:29:02.857292 |
SID: | 2030092 |
Source Port: | 42312 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.77.234.12941026802030092 03/05/23-19:28:25.483687 |
SID: | 2030092 |
Source Port: | 41026 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23197.195.8.2247836372152835222 03/05/23-19:29:10.195771 |
SID: | 2835222 |
Source Port: | 47836 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23197.193.193.2545272372152835222 03/05/23-19:29:36.930744 |
SID: | 2835222 |
Source Port: | 45272 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23156.254.87.3934328372152835222 03/05/23-19:27:51.674743 |
SID: | 2835222 |
Source Port: | 34328 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23211.204.59.14750962802030092 03/05/23-19:28:10.259519 |
SID: | 2030092 |
Source Port: | 50962 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.17.46.548294802030092 03/05/23-19:29:39.473448 |
SID: | 2030092 |
Source Port: | 48294 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.162.126.4832840372152835222 03/05/23-19:27:59.587255 |
SID: | 2835222 |
Source Port: | 32840 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23152.92.187.9641000802030092 03/05/23-19:28:16.684202 |
SID: | 2030092 |
Source Port: | 41000 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23186.156.189.7936650802030092 03/05/23-19:28:33.693083 |
SID: | 2030092 |
Source Port: | 36650 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23147.182.237.17946392802030092 03/05/23-19:29:30.237257 |
SID: | 2030092 |
Source Port: | 46392 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2399.84.248.9260388802030092 03/05/23-19:29:42.227554 |
SID: | 2030092 |
Source Port: | 60388 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.55.226.13250042802030092 03/05/23-19:29:03.001442 |
SID: | 2030092 |
Source Port: | 50042 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23188.165.192.8734394802030092 03/05/23-19:28:30.646962 |
SID: | 2030092 |
Source Port: | 34394 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23197.195.118.4844656372152835222 03/05/23-19:29:01.147964 |
SID: | 2835222 |
Source Port: | 44656 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23197.162.109.18752568802030092 03/05/23-19:28:33.529227 |
SID: | 2030092 |
Source Port: | 52568 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23121.182.89.12640568802030092 03/05/23-19:28:58.060343 |
SID: | 2030092 |
Source Port: | 40568 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.164.129.10341688802030092 03/05/23-19:28:57.913425 |
SID: | 2030092 |
Source Port: | 41688 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23209.10.16.10654396802030092 03/05/23-19:28:50.343906 |
SID: | 2030092 |
Source Port: | 54396 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.77.131.16357512802030092 03/05/23-19:29:08.100571 |
SID: | 2030092 |
Source Port: | 57512 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2343.163.225.20247308802030092 03/05/23-19:29:23.770346 |
SID: | 2030092 |
Source Port: | 47308 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23197.197.40.9644334372152835222 03/05/23-19:28:46.349503 |
SID: | 2835222 |
Source Port: | 44334 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23200.69.215.2059716802030092 03/05/23-19:29:10.903219 |
SID: | 2030092 |
Source Port: | 59716 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23213.140.145.12548902802030092 03/05/23-19:28:10.876293 |
SID: | 2030092 |
Source Port: | 48902 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.64.77.10348460802030092 03/05/23-19:28:19.071051 |
SID: | 2030092 |
Source Port: | 48460 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2345.203.122.1358624802030092 03/05/23-19:29:27.092521 |
SID: | 2030092 |
Source Port: | 58624 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.166.130.24860872372152835222 03/05/23-19:29:31.186943 |
SID: | 2835222 |
Source Port: | 60872 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23184.86.53.22349092802030092 03/05/23-19:27:43.659755 |
SID: | 2030092 |
Source Port: | 49092 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23126.147.254.2650102802030092 03/05/23-19:27:59.321328 |
SID: | 2030092 |
Source Port: | 50102 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23172.84.188.10944070802030092 03/05/23-19:28:57.562345 |
SID: | 2030092 |
Source Port: | 44070 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.60.135.17853022802030092 03/05/23-19:28:16.834895 |
SID: | 2030092 |
Source Port: | 53022 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2313.249.175.15047370802030092 03/05/23-19:28:04.911439 |
SID: | 2030092 |
Source Port: | 47370 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2340.127.87.17441218802030092 03/05/23-19:28:54.102804 |
SID: | 2030092 |
Source Port: | 41218 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23134.39.250.9836342802030092 03/05/23-19:29:10.928306 |
SID: | 2030092 |
Source Port: | 36342 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2320.60.131.19644408802030092 03/05/23-19:29:04.950449 |
SID: | 2030092 |
Source Port: | 44408 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23154.31.245.18952358802030092 03/05/23-19:28:50.659743 |
SID: | 2030092 |
Source Port: | 52358 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23192.122.135.9150290802030092 03/05/23-19:28:11.283472 |
SID: | 2030092 |
Source Port: | 50290 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23197.194.38.2248372372152835222 03/05/23-19:28:31.069563 |
SID: | 2835222 |
Source Port: | 48372 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23156.163.33.156180372152835222 03/05/23-19:28:16.471794 |
SID: | 2835222 |
Source Port: | 56180 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23119.223.63.24440184802030092 03/05/23-19:29:03.235216 |
SID: | 2030092 |
Source Port: | 40184 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23122.116.103.12355196802030092 03/05/23-19:28:28.944348 |
SID: | 2030092 |
Source Port: | 55196 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2346.165.252.5246782802030092 03/05/23-19:28:40.230397 |
SID: | 2030092 |
Source Port: | 46782 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23172.64.147.6244006802030092 03/05/23-19:29:23.494115 |
SID: | 2030092 |
Source Port: | 44006 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2350.62.195.5954240802030092 03/05/23-19:28:33.954846 |
SID: | 2030092 |
Source Port: | 54240 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2318.144.173.2046456802030092 03/05/23-19:28:17.008748 |
SID: | 2030092 |
Source Port: | 46456 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23172.120.61.20649110802030092 03/05/23-19:27:50.997161 |
SID: | 2030092 |
Source Port: | 49110 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2395.216.200.2555954802030092 03/05/23-19:29:33.748126 |
SID: | 2030092 |
Source Port: | 55954 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2373.46.56.13837372802030092 03/05/23-19:29:13.921459 |
SID: | 2030092 |
Source Port: | 37372 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23113.7.202.743714802030092 03/05/23-19:29:26.920622 |
SID: | 2030092 |
Source Port: | 43714 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23172.65.132.15042360802030092 03/05/23-19:28:13.590802 |
SID: | 2030092 |
Source Port: | 42360 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2341.153.165.8537150372152835222 03/05/23-19:28:54.923139 |
SID: | 2835222 |
Source Port: | 37150 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23148.255.147.7960168802030092 03/05/23-19:29:03.049535 |
SID: | 2030092 |
Source Port: | 60168 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2386.34.183.3439794802030092 03/05/23-19:29:42.149982 |
SID: | 2030092 |
Source Port: | 39794 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23136.244.100.7446186802030092 03/05/23-19:29:39.512849 |
SID: | 2030092 |
Source Port: | 46186 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2334.160.226.3144874802030092 03/05/23-19:28:36.628938 |
SID: | 2030092 |
Source Port: | 44874 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23206.237.235.10533290802030092 03/05/23-19:28:22.805030 |
SID: | 2030092 |
Source Port: | 33290 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23207.204.31.8033220802030092 03/05/23-19:28:40.330733 |
SID: | 2030092 |
Source Port: | 33220 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23201.110.90.12859894802030092 03/05/23-19:29:32.016443 |
SID: | 2030092 |
Source Port: | 59894 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23199.15.246.8448620802030092 03/05/23-19:28:38.879060 |
SID: | 2030092 |
Source Port: | 48620 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2334.101.130.19859542802030092 03/05/23-19:27:50.678553 |
SID: | 2030092 |
Source Port: | 59542 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2367.225.179.15858784802030092 03/05/23-19:28:25.842172 |
SID: | 2030092 |
Source Port: | 58784 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23197.193.30.8250962372152835222 03/05/23-19:29:36.912192 |
SID: | 2835222 |
Source Port: | 50962 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23197.193.219.23548190372152835222 03/05/23-19:27:49.262503 |
SID: | 2835222 |
Source Port: | 48190 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2323.49.150.20652018802030092 03/05/23-19:29:32.073985 |
SID: | 2030092 |
Source Port: | 52018 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.83.100.14733294802030092 03/05/23-19:27:43.501837 |
SID: | 2030092 |
Source Port: | 33294 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2341.153.50.11435578372152835222 03/05/23-19:27:51.451775 |
SID: | 2835222 |
Source Port: | 35578 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23110.49.26.24038994802030092 03/05/23-19:28:59.853830 |
SID: | 2030092 |
Source Port: | 38994 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23210.117.163.8052374802030092 03/05/23-19:29:27.270342 |
SID: | 2030092 |
Source Port: | 52374 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2313.227.47.4153068802030092 03/05/23-19:27:52.977522 |
SID: | 2030092 |
Source Port: | 53068 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23166.140.10.2555566802030092 03/05/23-19:29:21.012452 |
SID: | 2030092 |
Source Port: | 55566 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23212.73.159.3356270802030092 03/05/23-19:28:57.693788 |
SID: | 2030092 |
Source Port: | 56270 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23191.102.143.7258810802030092 03/05/23-19:28:19.840583 |
SID: | 2030092 |
Source Port: | 58810 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2345.48.68.5136216802030092 03/05/23-19:29:37.134310 |
SID: | 2030092 |
Source Port: | 36216 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.163.130.19733218372152835222 03/05/23-19:27:57.027478 |
SID: | 2835222 |
Source Port: | 33218 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2331.121.61.11759248802030092 03/05/23-19:28:07.524602 |
SID: | 2030092 |
Source Port: | 59248 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2393.187.212.6755252802030092 03/05/23-19:29:20.404431 |
SID: | 2030092 |
Source Port: | 55252 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.219.72.23555722802030092 03/05/23-19:29:20.390063 |
SID: | 2030092 |
Source Port: | 55722 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23185.143.235.7048602802030092 03/05/23-19:28:44.849953 |
SID: | 2030092 |
Source Port: | 48602 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23194.87.168.17759438802030092 03/05/23-19:29:04.527348 |
SID: | 2030092 |
Source Port: | 59438 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23207.150.217.448778802030092 03/05/23-19:29:35.201165 |
SID: | 2030092 |
Source Port: | 48778 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23197.192.2.7560938372152835222 03/05/23-19:27:49.264101 |
SID: | 2835222 |
Source Port: | 60938 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23114.115.179.2042958802030092 03/05/23-19:29:39.663828 |
SID: | 2030092 |
Source Port: | 42958 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.235.161.138.3647762802030092 03/05/23-19:28:04.753876 |
SID: | 2030092 |
Source Port: | 47762 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2392.205.144.21660454802030092 03/05/23-19:28:40.218980 |
SID: | 2030092 |
Source Port: | 60454 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.162.211.13343172372152835222 03/05/23-19:29:06.465479 |
SID: | 2835222 |
Source Port: | 43172 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2338.55.53.23438888802030092 03/05/23-19:29:27.020684 |
SID: | 2030092 |
Source Port: | 38888 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23178.250.243.2936396802030092 03/05/23-19:27:55.756021 |
SID: | 2030092 |
Source Port: | 36396 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23154.94.179.9358492802030092 03/05/23-19:29:39.902638 |
SID: | 2030092 |
Source Port: | 58492 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2341.152.166.20848198372152835222 03/05/23-19:28:16.589579 |
SID: | 2835222 |
Source Port: | 48198 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.231.14.168.258522802030092 03/05/23-19:29:32.104736 |
SID: | 2030092 |
Source Port: | 58522 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2347.97.26.4346032802030092 03/05/23-19:29:16.247940 |
SID: | 2030092 |
Source Port: | 46032 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23122.112.162.24250300802030092 03/05/23-19:27:52.962209 |
SID: | 2030092 |
Source Port: | 50300 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.166.147.11045814372152835222 03/05/23-19:28:10.372064 |
SID: | 2835222 |
Source Port: | 45814 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23122.112.162.24250358802030092 03/05/23-19:27:54.389979 |
SID: | 2030092 |
Source Port: | 50358 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23203.234.54.20140388802030092 03/05/23-19:29:35.366577 |
SID: | 2030092 |
Source Port: | 40388 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23199.232.64.340890802030092 03/05/23-19:28:18.798841 |
SID: | 2030092 |
Source Port: | 40890 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23197.199.31.10141876372152835222 03/05/23-19:29:18.520108 |
SID: | 2835222 |
Source Port: | 41876 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2349.143.42.11855342802030092 03/05/23-19:27:50.934552 |
SID: | 2030092 |
Source Port: | 55342 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2344.206.163.21845478802030092 03/05/23-19:28:44.759968 |
SID: | 2030092 |
Source Port: | 45478 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.163.153.21841504372152835222 03/05/23-19:27:49.260590 |
SID: | 2835222 |
Source Port: | 41504 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23182.54.188.23958668802030092 03/05/23-19:28:09.491618 |
SID: | 2030092 |
Source Port: | 58668 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.12.154.8660888802030092 03/05/23-19:27:59.951018 |
SID: | 2030092 |
Source Port: | 60888 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23108.170.59.10055418802030092 03/05/23-19:28:38.823937 |
SID: | 2030092 |
Source Port: | 55418 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.247.20.4948214372152835222 03/05/23-19:27:57.237098 |
SID: | 2835222 |
Source Port: | 48214 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23121.198.35.15557372802030092 03/05/23-19:28:10.808423 |
SID: | 2030092 |
Source Port: | 57372 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2347.92.139.19940770802030092 03/05/23-19:28:40.426716 |
SID: | 2030092 |
Source Port: | 40770 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.235.246.4749832802030092 03/05/23-19:28:40.372932 |
SID: | 2030092 |
Source Port: | 49832 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2365.9.131.16233436802030092 03/05/23-19:29:32.140484 |
SID: | 2030092 |
Source Port: | 33436 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.226.11.1342676372152835222 03/05/23-19:28:43.737530 |
SID: | 2835222 |
Source Port: | 42676 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23104.91.30.24653044802030092 03/05/23-19:29:07.536528 |
SID: | 2030092 |
Source Port: | 53044 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23190.144.120.8541502802030092 03/05/23-19:28:53.720755 |
SID: | 2030092 |
Source Port: | 41502 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.235.200.205.24933530802030092 03/05/23-19:29:13.317492 |
SID: | 2030092 |
Source Port: | 33530 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23204.112.251.12155948802030092 03/05/23-19:28:36.385174 |
SID: | 2030092 |
Source Port: | 55948 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.69.99.7340196802030092 03/05/23-19:29:04.757856 |
SID: | 2030092 |
Source Port: | 40196 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2369.234.246.1037220802030092 03/05/23-19:28:38.645388 |
SID: | 2030092 |
Source Port: | 37220 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23173.222.152.11760586802030092 03/05/23-19:28:41.854136 |
SID: | 2030092 |
Source Port: | 60586 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.162.37.17950086372152835222 03/05/23-19:27:44.781202 |
SID: | 2835222 |
Source Port: | 50086 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23156.247.29.11936296372152835222 03/05/23-19:29:37.115489 |
SID: | 2835222 |
Source Port: | 36296 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23123.60.60.18543302802030092 03/05/23-19:29:23.722507 |
SID: | 2030092 |
Source Port: | 43302 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.8.55.9660784802030092 03/05/23-19:29:42.373453 |
SID: | 2030092 |
Source Port: | 60784 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2346.150.12.3747420802030092 03/05/23-19:28:53.605221 |
SID: | 2030092 |
Source Port: | 47420 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23185.219.222.18052914802030092 03/05/23-19:27:49.315410 |
SID: | 2030092 |
Source Port: | 52914 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23184.50.67.25035620802030092 03/05/23-19:27:58.697226 |
SID: | 2030092 |
Source Port: | 35620 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23184.87.131.14954486802030092 03/05/23-19:29:20.633759 |
SID: | 2030092 |
Source Port: | 54486 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23139.162.197.19754862802030092 03/05/23-19:28:13.604672 |
SID: | 2030092 |
Source Port: | 54862 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.35.15.4744532802030092 03/05/23-19:28:22.823245 |
SID: | 2030092 |
Source Port: | 44532 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.57.79.15037622802030092 03/05/23-19:28:46.302361 |
SID: | 2030092 |
Source Port: | 37622 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.216.246.18842824802030092 03/05/23-19:29:42.179805 |
SID: | 2030092 |
Source Port: | 42824 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23181.209.134.8344070802030092 03/05/23-19:28:04.959225 |
SID: | 2030092 |
Source Port: | 44070 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23151.106.111.14837876802030092 03/05/23-19:28:33.829978 |
SID: | 2030092 |
Source Port: | 37876 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23190.2.149.22947198802030092 03/05/23-19:28:07.587077 |
SID: | 2030092 |
Source Port: | 47198 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2345.242.68.13160076802030092 03/05/23-19:29:30.343994 |
SID: | 2030092 |
Source Port: | 60076 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.162.215.12160144372152835222 03/05/23-19:29:07.645781 |
SID: | 2835222 |
Source Port: | 60144 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23107.154.236.1037268802030092 03/05/23-19:29:35.076971 |
SID: | 2030092 |
Source Port: | 37268 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.61.171.4942826802030092 03/05/23-19:29:35.171242 |
SID: | 2030092 |
Source Port: | 42826 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23117.185.143.10636032802030092 03/05/23-19:29:14.179685 |
SID: | 2030092 |
Source Port: | 36032 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2362.24.164.4146790802030092 03/05/23-19:29:31.833829 |
SID: | 2030092 |
Source Port: | 46790 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2385.187.11.2336184802030092 03/05/23-19:29:46.466670 |
SID: | 2030092 |
Source Port: | 36184 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2336.156.188.4036832802030092 03/05/23-19:27:53.215571 |
SID: | 2030092 |
Source Port: | 36832 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.163.118.25338670372152835222 03/05/23-19:29:12.444642 |
SID: | 2835222 |
Source Port: | 38670 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23185.56.218.10642462802030092 03/05/23-19:28:30.686478 |
SID: | 2030092 |
Source Port: | 42462 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23197.112.16.3355084802030092 03/05/23-19:29:04.538962 |
SID: | 2030092 |
Source Port: | 55084 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23197.197.0.18447478372152835222 03/05/23-19:29:29.739923 |
SID: | 2835222 |
Source Port: | 47478 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2360.43.226.22650224802030092 03/05/23-19:28:45.193156 |
SID: | 2030092 |
Source Port: | 50224 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.120.212.19856236802030092 03/05/23-19:29:02.737096 |
SID: | 2030092 |
Source Port: | 56236 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2313.33.254.10957946802030092 03/05/23-19:29:17.764521 |
SID: | 2030092 |
Source Port: | 57946 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.163.31.21639580372152835222 03/05/23-19:28:22.896063 |
SID: | 2835222 |
Source Port: | 39580 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23197.195.44.19338222372152835222 03/05/23-19:28:48.677081 |
SID: | 2835222 |
Source Port: | 38222 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23162.44.167.19848864802030092 03/05/23-19:28:09.491575 |
SID: | 2030092 |
Source Port: | 48864 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23201.140.248.20540282802030092 03/05/23-19:27:44.033831 |
SID: | 2030092 |
Source Port: | 40282 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23141.11.229.10637780802030092 03/05/23-19:29:13.632618 |
SID: | 2030092 |
Source Port: | 37780 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.166.176.11438704372152835222 03/05/23-19:29:45.757931 |
SID: | 2835222 |
Source Port: | 38704 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23216.250.128.14936960802030092 03/05/23-19:28:59.788141 |
SID: | 2030092 |
Source Port: | 36960 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.16.33.3344774802030092 03/05/23-19:29:23.664951 |
SID: | 2030092 |
Source Port: | 44774 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.254.59.19440440372152835222 03/05/23-19:28:57.413108 |
SID: | 2835222 |
Source Port: | 40440 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23156.254.59.21357192372152835222 03/05/23-19:28:35.752585 |
SID: | 2835222 |
Source Port: | 57192 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2373.58.37.25342896802030092 03/05/23-19:27:55.851774 |
SID: | 2030092 |
Source Port: | 42896 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2341.232.15.6351252802030092 03/05/23-19:28:50.318669 |
SID: | 2030092 |
Source Port: | 51252 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23154.91.183.6342982802030092 03/05/23-19:28:53.698718 |
SID: | 2030092 |
Source Port: | 42982 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.221.9.16255614802030092 03/05/23-19:29:34.082843 |
SID: | 2030092 |
Source Port: | 55614 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23194.195.94.1334060802030092 03/05/23-19:27:43.557874 |
SID: | 2030092 |
Source Port: | 34060 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.221.228.12837744802030092 03/05/23-19:29:30.278999 |
SID: | 2030092 |
Source Port: | 37744 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23159.223.62.9255428802030092 03/05/23-19:27:55.975182 |
SID: | 2030092 |
Source Port: | 55428 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23193.223.104.22343784802030092 03/05/23-19:28:22.401949 |
SID: | 2030092 |
Source Port: | 43784 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.254.72.23836266372152835222 03/05/23-19:28:41.177713 |
SID: | 2835222 |
Source Port: | 36266 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2346.2.189.21859620802030092 03/05/23-19:28:10.283216 |
SID: | 2030092 |
Source Port: | 59620 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23197.193.62.21035458372152835222 03/05/23-19:27:44.512579 |
SID: | 2835222 |
Source Port: | 35458 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.232.207.112.4254598802030092 03/05/23-19:29:15.813202 |
SID: | 2030092 |
Source Port: | 54598 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.254.94.10453918372152835222 03/05/23-19:28:06.992829 |
SID: | 2835222 |
Source Port: | 53918 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2366.160.187.18243598802030092 03/05/23-19:29:07.920810 |
SID: | 2030092 |
Source Port: | 43598 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23162.247.233.22246722802030092 03/05/23-19:29:26.853506 |
SID: | 2030092 |
Source Port: | 46722 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.17.15.18156646802030092 03/05/23-19:29:31.837288 |
SID: | 2030092 |
Source Port: | 56646 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23123.60.149.7957558802030092 03/05/23-19:27:58.792287 |
SID: | 2030092 |
Source Port: | 57558 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2354.199.33.16145314802030092 03/05/23-19:27:59.297890 |
SID: | 2030092 |
Source Port: | 45314 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2337.75.249.14842628802030092 03/05/23-19:27:46.576291 |
SID: | 2030092 |
Source Port: | 42628 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2313.110.40.22636218802030092 03/05/23-19:27:59.760356 |
SID: | 2030092 |
Source Port: | 36218 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.207.133.22537870802030092 03/05/23-19:27:50.997618 |
SID: | 2030092 |
Source Port: | 37870 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.238.219.175.24742852802030092 03/05/23-19:28:58.271753 |
SID: | 2030092 |
Source Port: | 42852 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2334.117.146.2251522802030092 03/05/23-19:29:10.439057 |
SID: | 2030092 |
Source Port: | 51522 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23223.109.172.5348338802030092 03/05/23-19:27:58.778889 |
SID: | 2030092 |
Source Port: | 48338 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2350.2.241.17736462802030092 03/05/23-19:27:54.124946 |
SID: | 2030092 |
Source Port: | 36462 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2380.38.199.24735144802030092 03/05/23-19:28:50.366954 |
SID: | 2030092 |
Source Port: | 35144 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23194.87.131.11954096802030092 03/05/23-19:28:25.409182 |
SID: | 2030092 |
Source Port: | 54096 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2341.153.150.1351008372152835222 03/05/23-19:29:40.465829 |
SID: | 2835222 |
Source Port: | 51008 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2318.181.46.4441572802030092 03/05/23-19:29:03.221170 |
SID: | 2030092 |
Source Port: | 41572 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.84.212.20541378802030092 03/05/23-19:28:51.152616 |
SID: | 2030092 |
Source Port: | 41378 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2341.152.168.10158214372152835222 03/05/23-19:28:35.747298 |
SID: | 2835222 |
Source Port: | 58214 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2352.51.248.1259280802030092 03/05/23-19:29:23.666093 |
SID: | 2030092 |
Source Port: | 59280 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.162.89.14433626372152835222 03/05/23-19:29:34.484176 |
SID: | 2835222 |
Source Port: | 33626 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2318.210.39.12953534802030092 03/05/23-19:28:07.780037 |
SID: | 2030092 |
Source Port: | 53534 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2313.33.80.24154686802030092 03/05/23-19:28:10.433911 |
SID: | 2030092 |
Source Port: | 54686 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2362.181.152.21652132802030092 03/05/23-19:28:07.516406 |
SID: | 2030092 |
Source Port: | 52132 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23190.85.6.7334768802030092 03/05/23-19:29:17.795287 |
SID: | 2030092 |
Source Port: | 34768 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23119.198.77.5446248802030092 03/05/23-19:28:36.444151 |
SID: | 2030092 |
Source Port: | 46248 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.213.85.19058424802030092 03/05/23-19:28:25.548828 |
SID: | 2030092 |
Source Port: | 58424 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2354.191.80.15733032802030092 03/05/23-19:27:59.949966 |
SID: | 2030092 |
Source Port: | 33032 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.162.228.3446350372152835222 03/05/23-19:28:43.538658 |
SID: | 2835222 |
Source Port: | 46350 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23156.254.59.7038058372152835222 03/05/23-19:28:53.332893 |
SID: | 2835222 |
Source Port: | 38058 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23181.215.221.18458932802030092 03/05/23-19:28:19.934149 |
SID: | 2030092 |
Source Port: | 58932 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23199.232.217.7335676802030092 03/05/23-19:27:55.771024 |
SID: | 2030092 |
Source Port: | 35676 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2318.179.63.455502802030092 03/05/23-19:29:17.874787 |
SID: | 2030092 |
Source Port: | 55502 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.57.31.8753336802030092 03/05/23-19:28:45.646303 |
SID: | 2030092 |
Source Port: | 53336 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23162.243.62.23860560802030092 03/05/23-19:29:17.721850 |
SID: | 2030092 |
Source Port: | 60560 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23118.48.127.19550630802030092 03/05/23-19:28:37.109153 |
SID: | 2030092 |
Source Port: | 50630 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23185.96.104.1652094802030092 03/05/23-19:27:50.708378 |
SID: | 2030092 |
Source Port: | 52094 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2318.165.65.15751738802030092 03/05/23-19:29:33.745554 |
SID: | 2030092 |
Source Port: | 51738 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23210.123.29.7841604802030092 03/05/23-19:28:45.169572 |
SID: | 2030092 |
Source Port: | 41604 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23150.60.171.23537942802030092 03/05/23-19:27:58.785851 |
SID: | 2030092 |
Source Port: | 37942 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23154.23.165.22257096802030092 03/05/23-19:28:40.369760 |
SID: | 2030092 |
Source Port: | 57096 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2358.200.192.1849064802030092 03/05/23-19:28:05.056982 |
SID: | 2030092 |
Source Port: | 49064 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.103.196.3433702802030092 03/05/23-19:28:10.843669 |
SID: | 2030092 |
Source Port: | 33702 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.163.164.19244632372152835222 03/05/23-19:29:16.194897 |
SID: | 2835222 |
Source Port: | 44632 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23197.199.41.12343800372152835222 03/05/23-19:29:29.794726 |
SID: | 2835222 |
Source Port: | 43800 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23197.194.144.15545386372152835222 03/05/23-19:28:26.735347 |
SID: | 2835222 |
Source Port: | 45386 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23156.230.26.8843794372152835222 03/05/23-19:28:25.379735 |
SID: | 2835222 |
Source Port: | 43794 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.235.172.159.22337994802030092 03/05/23-19:28:30.656661 |
SID: | 2030092 |
Source Port: | 37994 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.5.205.15549954802030092 03/05/23-19:29:04.926095 |
SID: | 2030092 |
Source Port: | 49954 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2334.210.170.9448282802030092 03/05/23-19:28:44.613894 |
SID: | 2030092 |
Source Port: | 48282 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.69.122.17647748802030092 03/05/23-19:29:20.504719 |
SID: | 2030092 |
Source Port: | 47748 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23144.202.2.8756534802030092 03/05/23-19:28:13.821578 |
SID: | 2030092 |
Source Port: | 56534 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23106.1.2.21255640802030092 03/05/23-19:28:57.777946 |
SID: | 2030092 |
Source Port: | 55640 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.52.234.24954068802030092 03/05/23-19:28:04.675427 |
SID: | 2030092 |
Source Port: | 54068 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2354.192.218.10960628802030092 03/05/23-19:28:04.708848 |
SID: | 2030092 |
Source Port: | 60628 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.98.1.7256852802030092 03/05/23-19:28:04.976734 |
SID: | 2030092 |
Source Port: | 56852 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23223.196.4.17337160802030092 03/05/23-19:29:32.164477 |
SID: | 2030092 |
Source Port: | 37160 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.70.103.6756810802030092 03/05/23-19:28:22.632159 |
SID: | 2030092 |
Source Port: | 56810 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2398.129.205.25156822802030092 03/05/23-19:28:38.790455 |
SID: | 2030092 |
Source Port: | 56822 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.226.14.20845588372152835222 03/05/23-19:28:16.679418 |
SID: | 2835222 |
Source Port: | 45588 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23197.192.231.20660012372152835222 03/05/23-19:28:35.708167 |
SID: | 2835222 |
Source Port: | 60012 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23156.230.27.3641262372152835222 03/05/23-19:28:54.866743 |
SID: | 2835222 |
Source Port: | 41262 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23156.254.98.25158156372152835222 03/05/23-19:29:01.087326 |
SID: | 2835222 |
Source Port: | 58156 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23104.20.37.1744228802030092 03/05/23-19:29:13.624270 |
SID: | 2030092 |
Source Port: | 44228 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.207.22.13749322802030092 03/05/23-19:28:36.845481 |
SID: | 2030092 |
Source Port: | 49322 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2335.160.211.22455096802030092 03/05/23-19:29:02.892021 |
SID: | 2030092 |
Source Port: | 55096 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2362.121.127.13245266802030092 03/05/23-19:29:10.458140 |
SID: | 2030092 |
Source Port: | 45266 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2374.50.157.7547552802030092 03/05/23-19:28:53.686248 |
SID: | 2030092 |
Source Port: | 47552 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.232.21.28.3052748802030092 03/05/23-19:28:47.807414 |
SID: | 2030092 |
Source Port: | 52748 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2384.183.59.11658580802030092 03/05/23-19:29:39.625118 |
SID: | 2030092 |
Source Port: | 58580 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2313.228.156.2733186802030092 03/05/23-19:27:54.174899 |
SID: | 2030092 |
Source Port: | 33186 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2369.166.205.7558774802030092 03/05/23-19:28:45.674150 |
SID: | 2030092 |
Source Port: | 58774 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.62.95.19135032802030092 03/05/23-19:29:02.879834 |
SID: | 2030092 |
Source Port: | 35032 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23197.240.138.1546688802030092 03/05/23-19:29:39.541219 |
SID: | 2030092 |
Source Port: | 46688 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2345.236.151.22336586802030092 03/05/23-19:29:18.009351 |
SID: | 2030092 |
Source Port: | 36586 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23197.192.233.5638526372152835222 03/05/23-19:28:35.716595 |
SID: | 2835222 |
Source Port: | 38526 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2323.54.26.10046840802030092 03/05/23-19:29:42.952199 |
SID: | 2030092 |
Source Port: | 46840 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.162.226.348444372152835222 03/05/23-19:28:22.894565 |
SID: | 2835222 |
Source Port: | 48444 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23160.124.13.18038920802030092 03/05/23-19:28:23.047116 |
SID: | 2030092 |
Source Port: | 38920 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23190.183.212.13159680802030092 03/05/23-19:28:28.952299 |
SID: | 2030092 |
Source Port: | 59680 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23197.195.252.25348106372152835222 03/05/23-19:27:51.504566 |
SID: | 2835222 |
Source Port: | 48106 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2334.120.111.157044802030092 03/05/23-19:29:10.422010 |
SID: | 2030092 |
Source Port: | 57044 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23103.207.113.23838576802030092 03/05/23-19:28:07.775186 |
SID: | 2030092 |
Source Port: | 38576 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23154.94.181.7244206802030092 03/05/23-19:28:12.367846 |
SID: | 2030092 |
Source Port: | 44206 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23185.233.116.3436334802030092 03/05/23-19:28:18.883669 |
SID: | 2030092 |
Source Port: | 36334 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23103.23.236.8859706802030092 03/05/23-19:27:56.110684 |
SID: | 2030092 |
Source Port: | 59706 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23165.22.193.14439326802030092 03/05/23-19:28:41.906798 |
SID: | 2030092 |
Source Port: | 39326 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2395.86.126.25547394802030092 03/05/23-19:28:18.934014 |
SID: | 2030092 |
Source Port: | 47394 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2313.225.214.14140062802030092 03/05/23-19:28:33.535970 |
SID: | 2030092 |
Source Port: | 40062 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23172.87.210.4833308802030092 03/05/23-19:29:10.591642 |
SID: | 2030092 |
Source Port: | 33308 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.254.99.10136748372152835222 03/05/23-19:28:12.768810 |
SID: | 2835222 |
Source Port: | 36748 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2323.52.9.9142160802030092 03/05/23-19:28:41.945149 |
SID: | 2030092 |
Source Port: | 42160 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23114.33.166.3844484802030092 03/05/23-19:29:24.044405 |
SID: | 2030092 |
Source Port: | 44484 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2380.64.31.8759970802030092 03/05/23-19:28:33.490251 |
SID: | 2030092 |
Source Port: | 59970 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.230.29.15239234372152835222 03/05/23-19:28:13.151036 |
SID: | 2835222 |
Source Port: | 39234 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2352.55.45.7052442802030092 03/05/23-19:27:53.828838 |
SID: | 2030092 |
Source Port: | 52442 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.163.48.16741878372152835222 03/05/23-19:28:21.341729 |
SID: | 2835222 |
Source Port: | 41878 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23196.51.255.13853354802030092 03/05/23-19:29:36.813112 |
SID: | 2030092 |
Source Port: | 53354 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2363.41.168.23053754802030092 03/05/23-19:29:24.082394 |
SID: | 2030092 |
Source Port: | 53754 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23216.155.111.14643136802030092 03/05/23-19:28:02.458608 |
SID: | 2030092 |
Source Port: | 43136 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2361.45.39.15041270802030092 03/05/23-19:28:30.867107 |
SID: | 2030092 |
Source Port: | 41270 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.18.206.10559104802030092 03/05/23-19:29:30.086451 |
SID: | 2030092 |
Source Port: | 59104 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.166.170.16856894372152835222 03/05/23-19:28:10.428447 |
SID: | 2835222 |
Source Port: | 56894 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23156.164.225.1747122372152835222 03/05/23-19:29:26.006896 |
SID: | 2835222 |
Source Port: | 47122 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2323.14.51.19040802802030092 03/05/23-19:29:20.796611 |
SID: | 2030092 |
Source Port: | 40802 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23179.53.208.4660690802030092 03/05/23-19:28:50.475003 |
SID: | 2030092 |
Source Port: | 60690 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23197.194.58.16555762372152835222 03/05/23-19:28:59.758689 |
SID: | 2835222 |
Source Port: | 55762 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2324.112.208.11544364802030092 03/05/23-19:28:36.477295 |
SID: | 2030092 |
Source Port: | 44364 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2313.80.30.6060452802030092 03/05/23-19:28:53.563423 |
SID: | 2030092 |
Source Port: | 60452 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23198.211.110.21360956802030092 03/05/23-19:29:33.888819 |
SID: | 2030092 |
Source Port: | 60956 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.110.72.1549770802030092 03/05/23-19:28:31.137256 |
SID: | 2030092 |
Source Port: | 49770 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2371.45.173.19440424802030092 03/05/23-19:27:58.686389 |
SID: | 2030092 |
Source Port: | 40424 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.163.204.17146960372152835222 03/05/23-19:29:31.211072 |
SID: | 2835222 |
Source Port: | 46960 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23109.250.167.22544770802030092 03/05/23-19:28:53.605272 |
SID: | 2030092 |
Source Port: | 44770 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2396.6.207.24835416802030092 03/05/23-19:28:59.847444 |
SID: | 2030092 |
Source Port: | 35416 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23146.75.3.13559586802030092 03/05/23-19:28:25.630204 |
SID: | 2030092 |
Source Port: | 59586 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.162.66.8743660372152835222 03/05/23-19:28:28.865701 |
SID: | 2835222 |
Source Port: | 43660 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23104.99.92.1454550802030092 03/05/23-19:28:50.945583 |
SID: | 2030092 |
Source Port: | 54550 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.254.88.6759542372152835222 03/05/23-19:28:18.953809 |
SID: | 2835222 |
Source Port: | 59542 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23130.61.204.3252208802030092 03/05/23-19:28:16.456290 |
SID: | 2030092 |
Source Port: | 52208 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2393.83.188.10648646802030092 03/05/23-19:28:07.613844 |
SID: | 2030092 |
Source Port: | 48646 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23197.192.42.7233384372152835222 03/05/23-19:29:43.623733 |
SID: | 2835222 |
Source Port: | 33384 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2389.146.44.24334554802030092 03/05/23-19:28:57.529618 |
SID: | 2030092 |
Source Port: | 34554 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.160.208.7951758372152835222 03/05/23-19:28:21.291680 |
SID: | 2835222 |
Source Port: | 51758 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2372.167.250.21854458802030092 03/05/23-19:29:13.347559 |
SID: | 2030092 |
Source Port: | 54458 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23190.109.234.16555508802030092 03/05/23-19:28:50.474860 |
SID: | 2030092 |
Source Port: | 55508 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.78.156.5044438802030092 03/05/23-19:28:19.176205 |
SID: | 2030092 |
Source Port: | 44438 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.164.214.22250410372152835222 03/05/23-19:29:04.312044 |
SID: | 2835222 |
Source Port: | 50410 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23216.197.121.7450890802030092 03/05/23-19:28:50.401385 |
SID: | 2030092 |
Source Port: | 50890 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.79.153.160510802030092 03/05/23-19:29:20.904591 |
SID: | 2030092 |
Source Port: | 60510 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23107.187.136.1760990802030092 03/05/23-19:27:53.011567 |
SID: | 2030092 |
Source Port: | 60990 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23172.252.117.24442098802030092 03/05/23-19:28:36.358235 |
SID: | 2030092 |
Source Port: | 42098 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23108.167.132.21143080802030092 03/05/23-19:29:26.659478 |
SID: | 2030092 |
Source Port: | 43080 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2373.85.34.3659908802030092 03/05/23-19:28:57.791522 |
SID: | 2030092 |
Source Port: | 59908 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2345.9.156.4545934802030092 03/05/23-19:27:46.513649 |
SID: | 2030092 |
Source Port: | 45934 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.216.32.14846098802030092 03/05/23-19:28:29.140189 |
SID: | 2030092 |
Source Port: | 46098 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23103.103.50.10638928802030092 03/05/23-19:28:53.690948 |
SID: | 2030092 |
Source Port: | 38928 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23149.56.176.9339148802030092 03/05/23-19:29:36.910803 |
SID: | 2030092 |
Source Port: | 39148 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.41.116.15633354802030092 03/05/23-19:28:19.437431 |
SID: | 2030092 |
Source Port: | 33354 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.28.199.8360154802030092 03/05/23-19:29:07.558720 |
SID: | 2030092 |
Source Port: | 60154 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.163.115.6844258372152835222 03/05/23-19:29:13.623611 |
SID: | 2835222 |
Source Port: | 44258 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23185.208.203.5941802802030092 03/05/23-19:28:12.376220 |
SID: | 2030092 |
Source Port: | 41802 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.60.85.25240600802030092 03/05/23-19:28:57.683061 |
SID: | 2030092 |
Source Port: | 40600 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23197.196.226.25541596372152835222 03/05/23-19:29:19.928590 |
SID: | 2835222 |
Source Port: | 41596 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2335.133.220.10341636802030092 03/05/23-19:29:23.931102 |
SID: | 2030092 |
Source Port: | 41636 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.230.18.5145744372152835222 03/05/23-19:29:01.108200 |
SID: | 2835222 |
Source Port: | 45744 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23156.162.221.18449964372152835222 03/05/23-19:28:28.869416 |
SID: | 2835222 |
Source Port: | 49964 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23104.85.53.14943404802030092 03/05/23-19:28:22.369686 |
SID: | 2030092 |
Source Port: | 43404 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.217.43.11444784802030092 03/05/23-19:29:35.161053 |
SID: | 2030092 |
Source Port: | 44784 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2345.130.253.20436484802030092 03/05/23-19:28:50.539728 |
SID: | 2030092 |
Source Port: | 36484 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23116.241.122.19440842802030092 03/05/23-19:29:03.028296 |
SID: | 2030092 |
Source Port: | 40842 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23197.194.38.8546644372152835222 03/05/23-19:28:06.784875 |
SID: | 2835222 |
Source Port: | 46644 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23184.87.237.13558698802030092 03/05/23-19:29:04.763179 |
SID: | 2030092 |
Source Port: | 58698 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23142.11.203.15653280802030092 03/05/23-19:28:59.788621 |
SID: | 2030092 |
Source Port: | 53280 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23118.70.74.17245616802030092 03/05/23-19:29:02.901465 |
SID: | 2030092 |
Source Port: | 45616 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23209.240.100.10740710802030092 03/05/23-19:29:15.949130 |
SID: | 2030092 |
Source Port: | 40710 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23202.46.34.7834086802030092 03/05/23-19:28:02.437470 |
SID: | 2030092 |
Source Port: | 34086 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.102.3.351594802030092 03/05/23-19:28:36.639805 |
SID: | 2030092 |
Source Port: | 51594 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23195.181.160.10836252802030092 03/05/23-19:28:25.614645 |
SID: | 2030092 |
Source Port: | 36252 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2369.195.78.17556622802030092 03/05/23-19:27:56.085897 |
SID: | 2030092 |
Source Port: | 56622 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23154.207.56.4640458802030092 03/05/23-19:28:25.872239 |
SID: | 2030092 |
Source Port: | 40458 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23180.81.168.15050058802030092 03/05/23-19:28:29.231014 |
SID: | 2030092 |
Source Port: | 50058 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.204.146.5849812802030092 03/05/23-19:27:43.791325 |
SID: | 2030092 |
Source Port: | 49812 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23149.156.26.10949588802030092 03/05/23-19:28:57.497246 |
SID: | 2030092 |
Source Port: | 49588 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23205.166.61.19356228802030092 03/05/23-19:27:55.808721 |
SID: | 2030092 |
Source Port: | 56228 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23213.47.151.17057010802030092 03/05/23-19:28:25.442442 |
SID: | 2030092 |
Source Port: | 57010 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23107.148.81.19742774802030092 03/05/23-19:28:36.924189 |
SID: | 2030092 |
Source Port: | 42774 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23187.32.38.955498802030092 03/05/23-19:28:26.091683 |
SID: | 2030092 |
Source Port: | 55498 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2346.140.208.18751864802030092 03/05/23-19:29:23.509030 |
SID: | 2030092 |
Source Port: | 51864 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.22.45.19348874802030092 03/05/23-19:27:50.695229 |
SID: | 2030092 |
Source Port: | 48874 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23165.225.230.11945950802030092 03/05/23-19:28:23.080308 |
SID: | 2030092 |
Source Port: | 45950 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2334.128.166.18438696802030092 03/05/23-19:29:17.638089 |
SID: | 2030092 |
Source Port: | 38696 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2313.57.100.9738324802030092 03/05/23-19:27:53.024872 |
SID: | 2030092 |
Source Port: | 38324 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2354.67.90.11041920802030092 03/05/23-19:28:29.117873 |
SID: | 2030092 |
Source Port: | 41920 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23172.65.170.5339734802030092 03/05/23-19:29:02.719870 |
SID: | 2030092 |
Source Port: | 39734 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.163.56.4447056372152835222 03/05/23-19:28:48.616671 |
SID: | 2835222 |
Source Port: | 47056 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23195.128.103.11657494802030092 03/05/23-19:28:50.265166 |
SID: | 2030092 |
Source Port: | 57494 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.166.159.2543754372152835222 03/05/23-19:29:06.582152 |
SID: | 2835222 |
Source Port: | 43754 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2323.9.26.22047926802030092 03/05/23-19:28:38.995851 |
SID: | 2030092 |
Source Port: | 47926 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.222.146.2240878802030092 03/05/23-19:29:33.686852 |
SID: | 2030092 |
Source Port: | 40878 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2354.148.109.3451794802030092 03/05/23-19:29:43.065724 |
SID: | 2030092 |
Source Port: | 51794 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2313.125.53.6151090802030092 03/05/23-19:28:59.918038 |
SID: | 2030092 |
Source Port: | 51090 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23208.66.57.6050062802030092 03/05/23-19:28:41.851551 |
SID: | 2030092 |
Source Port: | 50062 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2385.215.177.10043920802030092 03/05/23-19:29:10.432102 |
SID: | 2030092 |
Source Port: | 43920 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23117.209.106.10544052802030092 03/05/23-19:29:17.817866 |
SID: | 2030092 |
Source Port: | 44052 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23187.45.96.4039730802030092 03/05/23-19:29:20.811707 |
SID: | 2030092 |
Source Port: | 39730 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.93.119.951792802030092 03/05/23-19:29:05.128066 |
SID: | 2030092 |
Source Port: | 51792 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2341.153.155.22036368372152835222 03/05/23-19:29:10.305613 |
SID: | 2835222 |
Source Port: | 36368 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2338.47.141.12360580802030092 03/05/23-19:28:36.752421 |
SID: | 2030092 |
Source Port: | 60580 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23197.192.182.18736676372152835222 03/05/23-19:29:25.976603 |
SID: | 2835222 |
Source Port: | 36676 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2341.47.224.19459942372152835222 03/05/23-19:28:35.686071 |
SID: | 2835222 |
Source Port: | 59942 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2335.186.223.22442120802030092 03/05/23-19:29:31.820244 |
SID: | 2030092 |
Source Port: | 42120 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.241.168.18744492802030092 03/05/23-19:27:58.940480 |
SID: | 2030092 |
Source Port: | 44492 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.166.168.7754554372152835222 03/05/23-19:28:33.387215 |
SID: | 2835222 |
Source Port: | 54554 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23156.162.175.17754584372152835222 03/05/23-19:29:22.060372 |
SID: | 2835222 |
Source Port: | 54584 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23159.89.175.12555658802030092 03/05/23-19:29:13.341480 |
SID: | 2030092 |
Source Port: | 55658 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.162.110.15244574372152835222 03/05/23-19:28:46.332896 |
SID: | 2835222 |
Source Port: | 44574 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2320.219.52.18053732802030092 03/05/23-19:29:30.375474 |
SID: | 2030092 |
Source Port: | 53732 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2345.133.91.22051468802030092 03/05/23-19:27:59.557881 |
SID: | 2030092 |
Source Port: | 51468 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.47.211.24551782802030092 03/05/23-19:29:20.755244 |
SID: | 2030092 |
Source Port: | 51782 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2331.193.235.13856826802030092 03/05/23-19:29:46.497327 |
SID: | 2030092 |
Source Port: | 56826 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2345.148.148.19434306802030092 03/05/23-19:28:36.669654 |
SID: | 2030092 |
Source Port: | 34306 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.235.111.17437306372152835222 03/05/23-19:29:23.720238 |
SID: | 2835222 |
Source Port: | 37306 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2343.204.51.17953152802030092 03/05/23-19:27:56.003211 |
SID: | 2030092 |
Source Port: | 53152 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23116.202.16.9040998802030092 03/05/23-19:28:38.673423 |
SID: | 2030092 |
Source Port: | 40998 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2318.160.246.19751636802030092 03/05/23-19:27:53.004305 |
SID: | 2030092 |
Source Port: | 51636 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.202.134.24041226802030092 03/05/23-19:28:22.488252 |
SID: | 2030092 |
Source Port: | 41226 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.162.36.14240990372152835222 03/05/23-19:29:45.811237 |
SID: | 2835222 |
Source Port: | 40990 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2395.160.59.12056370802030092 03/05/23-19:27:43.527359 |
SID: | 2030092 |
Source Port: | 56370 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23155.138.32.5757692802030092 03/05/23-19:27:53.012897 |
SID: | 2030092 |
Source Port: | 57692 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2368.142.5.5949624802030092 03/05/23-19:28:12.336908 |
SID: | 2030092 |
Source Port: | 49624 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2384.19.112.21444156802030092 03/05/23-19:29:33.710439 |
SID: | 2030092 |
Source Port: | 44156 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.9.24.138044802030092 03/05/23-19:28:05.035550 |
SID: | 2030092 |
Source Port: | 38044 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.110.133.6534336802030092 03/05/23-19:28:25.767645 |
SID: | 2030092 |
Source Port: | 34336 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23107.158.138.8553310802030092 03/05/23-19:28:13.959091 |
SID: | 2030092 |
Source Port: | 53310 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.235.39.116.19044936802030092 03/05/23-19:29:39.517623 |
SID: | 2030092 |
Source Port: | 44936 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23217.110.238.12260250802030092 03/05/23-19:29:07.617989 |
SID: | 2030092 |
Source Port: | 60250 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23149.210.129.13851820802030092 03/05/23-19:28:18.839856 |
SID: | 2030092 |
Source Port: | 51820 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23146.148.153.6759820802030092 03/05/23-19:28:33.971387 |
SID: | 2030092 |
Source Port: | 59820 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.96.34.10741186802030092 03/05/23-19:29:07.558634 |
SID: | 2030092 |
Source Port: | 41186 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2345.132.91.14349262802030092 03/05/23-19:28:02.727681 |
SID: | 2030092 |
Source Port: | 49262 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.162.92.21060652372152835222 03/05/23-19:29:23.683754 |
SID: | 2835222 |
Source Port: | 60652 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23179.24.13.8651598802030092 03/05/23-19:27:43.908321 |
SID: | 2030092 |
Source Port: | 51598 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2386.69.83.15138748802030092 03/05/23-19:27:46.429310 |
SID: | 2030092 |
Source Port: | 38748 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.207.75.14653650802030092 03/05/23-19:28:07.947090 |
SID: | 2030092 |
Source Port: | 53650 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23164.58.104.7735648802030092 03/05/23-19:29:33.798424 |
SID: | 2030092 |
Source Port: | 35648 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2391.106.85.15743140802030092 03/05/23-19:29:39.847855 |
SID: | 2030092 |
Source Port: | 43140 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23154.211.119.11335248802030092 03/05/23-19:28:23.013737 |
SID: | 2030092 |
Source Port: | 35248 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23200.113.77.24956606802030092 03/05/23-19:27:44.107884 |
SID: | 2030092 |
Source Port: | 56606 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23114.205.124.20959640802030092 03/05/23-19:28:11.238015 |
SID: | 2030092 |
Source Port: | 59640 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2391.92.185.25349548802030092 03/05/23-19:28:36.468964 |
SID: | 2030092 |
Source Port: | 49548 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23103.78.193.25142126802030092 03/05/23-19:27:51.188983 |
SID: | 2030092 |
Source Port: | 42126 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.193.219.4935576802030092 03/05/23-19:27:46.826944 |
SID: | 2030092 |
Source Port: | 35576 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23173.0.138.4343026802030092 03/05/23-19:29:33.797749 |
SID: | 2030092 |
Source Port: | 43026 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23102.223.72.11443522802030092 03/05/23-19:29:42.521416 |
SID: | 2030092 |
Source Port: | 43522 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2334.111.106.18335010802030092 03/05/23-19:29:13.626279 |
SID: | 2030092 |
Source Port: | 35010 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23148.139.109.5654300802030092 03/05/23-19:28:58.154266 |
SID: | 2030092 |
Source Port: | 54300 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23160.19.39.735868802030092 03/05/23-19:28:11.843947 |
SID: | 2030092 |
Source Port: | 35868 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23212.68.50.20653522802030092 03/05/23-19:27:52.893242 |
SID: | 2030092 |
Source Port: | 53522 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2354.254.6.8846680802030092 03/05/23-19:28:54.003090 |
SID: | 2030092 |
Source Port: | 46680 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23107.149.107.13451064802030092 03/05/23-19:28:02.331906 |
SID: | 2030092 |
Source Port: | 51064 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2380.160.64.16349142802030092 03/05/23-19:28:59.823956 |
SID: | 2030092 |
Source Port: | 49142 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23192.177.94.25441748802030092 03/05/23-19:29:10.745310 |
SID: | 2030092 |
Source Port: | 41748 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23173.223.208.23439252802030092 03/05/23-19:29:13.569066 |
SID: | 2030092 |
Source Port: | 39252 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23106.15.2.5856454802030092 03/05/23-19:29:02.979992 |
SID: | 2030092 |
Source Port: | 56454 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23194.76.137.5560740802030092 03/05/23-19:29:26.980958 |
SID: | 2030092 |
Source Port: | 60740 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2344.231.54.2138928802030092 03/05/23-19:27:56.108025 |
SID: | 2030092 |
Source Port: | 38928 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23197.192.16.4947940372152835222 03/05/23-19:28:25.178742 |
SID: | 2835222 |
Source Port: | 47940 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23106.1.77.5340808802030092 03/05/23-19:28:28.684114 |
SID: | 2030092 |
Source Port: | 40808 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23197.195.14.16034422372152835222 03/05/23-19:28:33.389038 |
SID: | 2835222 |
Source Port: | 34422 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23113.7.202.743720802030092 03/05/23-19:29:27.095786 |
SID: | 2030092 |
Source Port: | 43720 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.93.223.1050316802030092 03/05/23-19:28:11.081491 |
SID: | 2030092 |
Source Port: | 50316 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23197.199.34.8835382372152835222 03/05/23-19:28:50.812706 |
SID: | 2835222 |
Source Port: | 35382 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23156.93.225.2747494372152835222 03/05/23-19:27:49.224732 |
SID: | 2835222 |
Source Port: | 47494 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23187.26.160.18544502802030092 03/05/23-19:29:23.940453 |
SID: | 2030092 |
Source Port: | 44502 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2396.17.59.2735524802030092 03/05/23-19:29:27.907828 |
SID: | 2030092 |
Source Port: | 35524 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23107.163.4.10049896802030092 03/05/23-19:28:31.133616 |
SID: | 2030092 |
Source Port: | 49896 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23163.237.214.14948188802030092 03/05/23-19:28:38.771936 |
SID: | 2030092 |
Source Port: | 48188 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23197.193.45.13754326372152835222 03/05/23-19:29:22.083086 |
SID: | 2835222 |
Source Port: | 54326 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23197.196.236.15735452372152835222 03/05/23-19:29:25.952194 |
SID: | 2835222 |
Source Port: | 35452 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23195.201.142.14348536802030092 03/05/23-19:29:26.410699 |
SID: | 2030092 |
Source Port: | 48536 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2365.109.163.18857184802030092 03/05/23-19:29:46.505207 |
SID: | 2030092 |
Source Port: | 57184 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23216.83.54.13560464802030092 03/05/23-19:27:54.180420 |
SID: | 2030092 |
Source Port: | 60464 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23184.25.2.12452170802030092 03/05/23-19:29:13.459267 |
SID: | 2030092 |
Source Port: | 52170 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2389.161.224.24238668802030092 03/05/23-19:28:10.264870 |
SID: | 2030092 |
Source Port: | 38668 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.202.246.18856784802030092 03/05/23-19:28:19.761552 |
SID: | 2030092 |
Source Port: | 56784 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23173.16.223.9936354802030092 03/05/23-19:29:26.522622 |
SID: | 2030092 |
Source Port: | 36354 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23184.85.26.18948838802030092 03/05/23-19:28:44.645595 |
SID: | 2030092 |
Source Port: | 48838 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23185.19.0.8834682802030092 03/05/23-19:29:07.626608 |
SID: | 2030092 |
Source Port: | 34682 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.207.251.6648536802030092 03/05/23-19:29:10.532534 |
SID: | 2030092 |
Source Port: | 48536 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23185.106.94.12234800802030092 03/05/23-19:29:46.488734 |
SID: | 2030092 |
Source Port: | 34800 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2366.220.130.13357796802030092 03/05/23-19:28:36.521612 |
SID: | 2030092 |
Source Port: | 57796 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23188.218.246.8951912802030092 03/05/23-19:27:49.334169 |
SID: | 2030092 |
Source Port: | 51912 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23176.57.217.2341070802030092 03/05/23-19:28:13.788614 |
SID: | 2030092 |
Source Port: | 41070 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2334.117.159.17350686802030092 03/05/23-19:28:33.454126 |
SID: | 2030092 |
Source Port: | 50686 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23184.86.106.17350730802030092 03/05/23-19:29:04.925185 |
SID: | 2030092 |
Source Port: | 50730 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2345.150.18.1342084802030092 03/05/23-19:29:07.903796 |
SID: | 2030092 |
Source Port: | 42084 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2331.220.56.17042184802030092 03/05/23-19:28:16.574434 |
SID: | 2030092 |
Source Port: | 42184 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23130.233.14.4153540802030092 03/05/23-19:29:30.116167 |
SID: | 2030092 |
Source Port: | 53540 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.63.18.13248266802030092 03/05/23-19:28:03.287630 |
SID: | 2030092 |
Source Port: | 48266 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23195.43.53.3543004802030092 03/05/23-19:28:04.708892 |
SID: | 2030092 |
Source Port: | 43004 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23170.39.81.6733036802030092 03/05/23-19:28:30.691780 |
SID: | 2030092 |
Source Port: | 33036 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23116.203.218.140154802030092 03/05/23-19:29:04.518910 |
SID: | 2030092 |
Source Port: | 40154 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2351.143.118.19356862802030092 03/05/23-19:29:10.572872 |
SID: | 2030092 |
Source Port: | 56862 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.217.224.3139870802030092 03/05/23-19:28:36.386708 |
SID: | 2030092 |
Source Port: | 39870 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2361.63.179.547260802030092 03/05/23-19:28:45.076054 |
SID: | 2030092 |
Source Port: | 47260 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23197.197.136.18443970372152835222 03/05/23-19:29:13.632197 |
SID: | 2835222 |
Source Port: | 43970 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23124.104.144.19455464802030092 03/05/23-19:29:14.166747 |
SID: | 2030092 |
Source Port: | 55464 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23154.36.202.1835680802030092 03/05/23-19:29:42.270312 |
SID: | 2030092 |
Source Port: | 35680 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23197.199.15.10552690372152835222 03/05/23-19:28:53.128997 |
SID: | 2835222 |
Source Port: | 52690 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23130.164.169.21634728802030092 03/05/23-19:28:19.856965 |
SID: | 2030092 |
Source Port: | 34728 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.13.70.24146008802030092 03/05/23-19:28:41.964523 |
SID: | 2030092 |
Source Port: | 46008 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23197.192.252.16234584372152835222 03/05/23-19:29:12.495652 |
SID: | 2835222 |
Source Port: | 34584 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23207.179.93.14154900802030092 03/05/23-19:29:27.918234 |
SID: | 2030092 |
Source Port: | 54900 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23132.205.100.9246964802030092 03/05/23-19:28:50.795455 |
SID: | 2030092 |
Source Port: | 46964 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2394.228.120.21941884802030092 03/05/23-19:27:52.894553 |
SID: | 2030092 |
Source Port: | 41884 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23154.91.246.14846406802030092 03/05/23-19:29:26.885515 |
SID: | 2030092 |
Source Port: | 46406 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23121.151.249.22833630802030092 03/05/23-19:27:59.296723 |
SID: | 2030092 |
Source Port: | 33630 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23147.46.37.21158768802030092 03/05/23-19:27:43.950738 |
SID: | 2030092 |
Source Port: | 58768 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23221.178.98.6042720802030092 03/05/23-19:28:17.214406 |
SID: | 2030092 |
Source Port: | 42720 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23121.130.235.5937226802030092 03/05/23-19:28:30.845106 |
SID: | 2030092 |
Source Port: | 37226 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23154.38.150.13935222802030092 03/05/23-19:28:04.910833 |
SID: | 2030092 |
Source Port: | 35222 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23187.191.96.21739730802030092 03/05/23-19:29:18.102256 |
SID: | 2030092 |
Source Port: | 39730 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.43.142.20851978802030092 03/05/23-19:28:19.775992 |
SID: | 2030092 |
Source Port: | 51978 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.164.231.13234528372152835222 03/05/23-19:28:21.286649 |
SID: | 2835222 |
Source Port: | 34528 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23192.225.158.19434440802030092 03/05/23-19:28:12.366899 |
SID: | 2030092 |
Source Port: | 34440 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2320.22.37.2935880802030092 03/05/23-19:28:50.449781 |
SID: | 2030092 |
Source Port: | 35880 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2345.144.223.11043634802030092 03/05/23-19:28:33.506992 |
SID: | 2030092 |
Source Port: | 43634 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.164.239.20839454372152835222 03/05/23-19:27:49.267375 |
SID: | 2835222 |
Source Port: | 39454 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2344.202.162.16045450802030092 03/05/23-19:28:16.583104 |
SID: | 2030092 |
Source Port: | 45450 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.73.158.15838604802030092 03/05/23-19:28:28.468992 |
SID: | 2030092 |
Source Port: | 38604 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23175.29.149.19157520802030092 03/05/23-19:28:57.947460 |
SID: | 2030092 |
Source Port: | 57520 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23199.232.197.149430802030092 03/05/23-19:29:07.531179 |
SID: | 2030092 |
Source Port: | 49430 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23122.200.242.25150512802030092 03/05/23-19:29:07.780721 |
SID: | 2030092 |
Source Port: | 50512 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2382.147.216.11937180802030092 03/05/23-19:28:28.459720 |
SID: | 2030092 |
Source Port: | 37180 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23193.232.114.1254596802030092 03/05/23-19:28:38.806073 |
SID: | 2030092 |
Source Port: | 54596 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2372.252.9.9757088802030092 03/05/23-19:28:50.601646 |
SID: | 2030092 |
Source Port: | 57088 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.38.180.4040030802030092 03/05/23-19:28:53.669190 |
SID: | 2030092 |
Source Port: | 40030 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.162.178.20860914372152835222 03/05/23-19:28:40.956158 |
SID: | 2835222 |
Source Port: | 60914 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2352.68.141.6647680802030092 03/05/23-19:29:03.221542 |
SID: | 2030092 |
Source Port: | 47680 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23178.73.250.20342474802030092 03/05/23-19:27:50.713934 |
SID: | 2030092 |
Source Port: | 42474 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23125.229.137.14748176802030092 03/05/23-19:29:10.672597 |
SID: | 2030092 |
Source Port: | 48176 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23197.194.33.13856468372152835222 03/05/23-19:29:18.463672 |
SID: | 2835222 |
Source Port: | 56468 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23120.27.12.23446566802030092 03/05/23-19:29:14.171487 |
SID: | 2030092 |
Source Port: | 46566 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2354.88.34.2844986802030092 03/05/23-19:27:50.767229 |
SID: | 2030092 |
Source Port: | 44986 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2387.98.228.2650268802030092 03/05/23-19:28:04.708962 |
SID: | 2030092 |
Source Port: | 50268 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23197.194.7.2847498372152835222 03/05/23-19:28:43.800200 |
SID: | 2835222 |
Source Port: | 47498 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23159.203.150.848186802030092 03/05/23-19:28:18.885991 |
SID: | 2030092 |
Source Port: | 48186 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2318.177.9.17944982802030092 03/05/23-19:29:13.430387 |
SID: | 2030092 |
Source Port: | 44982 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23184.26.116.19458246802030092 03/05/23-19:29:39.590490 |
SID: | 2030092 |
Source Port: | 58246 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23185.206.83.1342742802030092 03/05/23-19:28:18.862654 |
SID: | 2030092 |
Source Port: | 42742 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23165.232.125.18350572802030092 03/05/23-19:28:25.456809 |
SID: | 2030092 |
Source Port: | 50572 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23187.120.231.24132788802030092 03/05/23-19:28:20.083084 |
SID: | 2030092 |
Source Port: | 32788 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2354.89.82.5439706802030092 03/05/23-19:29:16.059827 |
SID: | 2030092 |
Source Port: | 39706 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23161.142.109.16041432802030092 03/05/23-19:28:19.317680 |
SID: | 2030092 |
Source Port: | 41432 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.199.142.24644422802030092 03/05/23-19:28:53.994426 |
SID: | 2030092 |
Source Port: | 44422 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23223.109.172.5348336802030092 03/05/23-19:27:58.790958 |
SID: | 2030092 |
Source Port: | 48336 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.84.192.4960260802030092 03/05/23-19:27:52.849294 |
SID: | 2030092 |
Source Port: | 60260 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.231.13.192.3646764802030092 03/05/23-19:29:37.188221 |
SID: | 2030092 |
Source Port: | 46764 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23195.201.175.13159246802030092 03/05/23-19:27:50.701597 |
SID: | 2030092 |
Source Port: | 59246 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23172.252.71.17844138802030092 03/05/23-19:28:02.956647 |
SID: | 2030092 |
Source Port: | 44138 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23154.211.105.13757580802030092 03/05/23-19:28:50.991783 |
SID: | 2030092 |
Source Port: | 57580 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23164.61.226.5260060802030092 03/05/23-19:28:02.269441 |
SID: | 2030092 |
Source Port: | 60060 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2359.106.177.15152224802030092 03/05/23-19:28:02.428811 |
SID: | 2030092 |
Source Port: | 52224 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23120.27.12.23446610802030092 03/05/23-19:29:15.722174 |
SID: | 2030092 |
Source Port: | 46610 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2334.216.249.4450866802030092 03/05/23-19:27:59.699638 |
SID: | 2030092 |
Source Port: | 50866 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23138.4.112.955446802030092 03/05/23-19:28:53.570404 |
SID: | 2030092 |
Source Port: | 55446 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2345.25.211.5057666802030092 03/05/23-19:29:36.956536 |
SID: | 2030092 |
Source Port: | 57666 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.162.140.21451646372152835222 03/05/23-19:29:45.812443 |
SID: | 2835222 |
Source Port: | 51646 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2387.253.131.6759722802030092 03/05/23-19:28:36.635925 |
SID: | 2030092 |
Source Port: | 59722 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2377.73.131.6856816802030092 03/05/23-19:29:26.457007 |
SID: | 2030092 |
Source Port: | 56816 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2341.153.226.8233106372152835222 03/05/23-19:28:21.395721 |
SID: | 2835222 |
Source Port: | 33106 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23185.232.70.3050620802030092 03/05/23-19:28:16.462503 |
SID: | 2030092 |
Source Port: | 50620 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2398.193.136.7150158802030092 03/05/23-19:28:16.717704 |
SID: | 2030092 |
Source Port: | 50158 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.253.58.5345672802030092 03/05/23-19:29:10.917556 |
SID: | 2030092 |
Source Port: | 45672 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23132.234.65.560542802030092 03/05/23-19:29:00.359226 |
SID: | 2030092 |
Source Port: | 60542 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.164.204.6857890372152835222 03/05/23-19:29:01.139993 |
SID: | 2835222 |
Source Port: | 57890 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23130.15.139.12841010802030092 03/05/23-19:29:15.854418 |
SID: | 2030092 |
Source Port: | 41010 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23139.45.197.22653424802030092 03/05/23-19:27:43.466961 |
SID: | 2030092 |
Source Port: | 53424 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.204.176.5947292802030092 03/05/23-19:28:19.065010 |
SID: | 2030092 |
Source Port: | 47292 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2318.67.95.24941204802030092 03/05/23-19:28:45.285261 |
SID: | 2030092 |
Source Port: | 41204 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23197.193.54.4256042372152835222 03/05/23-19:29:22.058246 |
SID: | 2835222 |
Source Port: | 56042 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23140.248.156.3857804802030092 03/05/23-19:28:28.426136 |
SID: | 2030092 |
Source Port: | 57804 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23202.124.250.11647856802030092 03/05/23-19:29:26.920200 |
SID: | 2030092 |
Source Port: | 47856 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23179.43.127.19045120802030092 03/05/23-19:28:33.700326 |
SID: | 2030092 |
Source Port: | 45120 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.77.131.17342322372152835222 03/05/23-19:27:49.243475 |
SID: | 2835222 |
Source Port: | 42322 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2323.42.172.18559570802030092 03/05/23-19:28:14.140588 |
SID: | 2030092 |
Source Port: | 59570 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.163.212.1145416372152835222 03/05/23-19:28:40.955536 |
SID: | 2835222 |
Source Port: | 45416 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23197.193.31.14056734372152835222 03/05/23-19:29:40.482604 |
SID: | 2835222 |
Source Port: | 56734 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23203.68.92.18460048802030092 03/05/23-19:28:02.473888 |
SID: | 2030092 |
Source Port: | 60048 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2335.177.11.4952140802030092 03/05/23-19:28:28.411530 |
SID: | 2030092 |
Source Port: | 52140 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2392.38.56.1435512802030092 03/05/23-19:28:38.715244 |
SID: | 2030092 |
Source Port: | 35512 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23185.91.116.15960656802030092 03/05/23-19:28:47.805790 |
SID: | 2030092 |
Source Port: | 60656 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.75.36.4342488802030092 03/05/23-19:29:15.984240 |
SID: | 2030092 |
Source Port: | 42488 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2345.38.151.23838574802030092 03/05/23-19:29:26.840748 |
SID: | 2030092 |
Source Port: | 38574 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.227.244.10446562372152835222 03/05/23-19:29:27.375406 |
SID: | 2835222 |
Source Port: | 46562 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23197.193.177.21746390372152835222 03/05/23-19:29:12.442834 |
SID: | 2835222 |
Source Port: | 46390 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23142.34.230.12659704802030092 03/05/23-19:28:25.584796 |
SID: | 2030092 |
Source Port: | 59704 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.94.113.11636830802030092 03/05/23-19:29:13.277772 |
SID: | 2030092 |
Source Port: | 36830 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23220.87.105.11051504802030092 03/05/23-19:28:30.839572 |
SID: | 2030092 |
Source Port: | 51504 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2341.153.222.4252724372152835222 03/05/23-19:29:22.115003 |
SID: | 2835222 |
Source Port: | 52724 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23189.253.1.23336586802030092 03/05/23-19:28:13.968993 |
SID: | 2030092 |
Source Port: | 36586 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2345.38.81.22640694802030092 03/05/23-19:27:52.843038 |
SID: | 2030092 |
Source Port: | 40694 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2320.227.18.14657638802030092 03/05/23-19:29:08.102426 |
SID: | 2030092 |
Source Port: | 57638 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23185.63.65.1343650802030092 03/05/23-19:28:28.425201 |
SID: | 2030092 |
Source Port: | 43650 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2380.209.225.16747018802030092 03/05/23-19:27:43.485803 |
SID: | 2030092 |
Source Port: | 47018 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23164.155.251.1936110802030092 03/05/23-19:28:46.036645 |
SID: | 2030092 |
Source Port: | 36110 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2341.238.190.16841772372152835222 03/05/23-19:28:50.962151 |
SID: | 2835222 |
Source Port: | 41772 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23118.221.14.11856608802030092 03/05/23-19:28:29.237953 |
SID: | 2030092 |
Source Port: | 56608 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2381.68.168.22042478802030092 03/05/23-19:28:48.221050 |
SID: | 2030092 |
Source Port: | 42478 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23217.5.210.21449262802030092 03/05/23-19:28:04.708780 |
SID: | 2030092 |
Source Port: | 49262 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23221.178.98.6042732802030092 03/05/23-19:28:17.472919 |
SID: | 2030092 |
Source Port: | 42732 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2335.157.147.16159646802030092 03/05/23-19:28:28.431350 |
SID: | 2030092 |
Source Port: | 59646 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2313.227.78.24739294802030092 03/05/23-19:27:50.998164 |
SID: | 2030092 |
Source Port: | 39294 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23111.234.191.11645764802030092 03/05/23-19:28:51.164023 |
SID: | 2030092 |
Source Port: | 45764 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2341.153.17.5353876372152835222 03/05/23-19:28:38.605167 |
SID: | 2835222 |
Source Port: | 53876 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23104.120.163.13033096802030092 03/05/23-19:27:50.961807 |
SID: | 2030092 |
Source Port: | 33096 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.162.93.8332812372152835222 03/05/23-19:28:46.338267 |
SID: | 2835222 |
Source Port: | 32812 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2323.220.120.22836934802030092 03/05/23-19:27:58.797005 |
SID: | 2030092 |
Source Port: | 36934 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23185.213.195.21654176802030092 03/05/23-19:28:07.874101 |
SID: | 2030092 |
Source Port: | 54176 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.160.192.8043238372152835222 03/05/23-19:29:34.490068 |
SID: | 2835222 |
Source Port: | 43238 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23198.145.239.20959482802030092 03/05/23-19:28:53.634101 |
SID: | 2030092 |
Source Port: | 59482 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23197.192.205.11651730372152835222 03/05/23-19:29:04.300031 |
SID: | 2835222 |
Source Port: | 51730 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23101.132.139.16859328802030092 03/05/23-19:27:53.695396 |
SID: | 2030092 |
Source Port: | 59328 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.164.211.8034824372152835222 03/05/23-19:29:23.621916 |
SID: | 2835222 |
Source Port: | 34824 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23165.22.200.3635562802030092 03/05/23-19:29:26.467214 |
SID: | 2030092 |
Source Port: | 35562 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.73.35.2846424802030092 03/05/23-19:28:25.858480 |
SID: | 2030092 |
Source Port: | 46424 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23197.197.166.7039468372152835222 03/05/23-19:28:43.544881 |
SID: | 2835222 |
Source Port: | 39468 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2323.220.37.22239332802030092 03/05/23-19:29:30.350467 |
SID: | 2030092 |
Source Port: | 39332 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2379.248.244.7256232802030092 03/05/23-19:28:33.642871 |
SID: | 2030092 |
Source Port: | 56232 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2340.83.240.21640342802030092 03/05/23-19:28:38.995150 |
SID: | 2030092 |
Source Port: | 40342 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2390.127.207.9650196802030092 03/05/23-19:29:10.472104 |
SID: | 2030092 |
Source Port: | 50196 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2395.86.66.4355702802030092 03/05/23-19:27:59.579693 |
SID: | 2030092 |
Source Port: | 55702 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23130.49.168.13938572802030092 03/05/23-19:29:02.821752 |
SID: | 2030092 |
Source Port: | 38572 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.13.73.16254328802030092 03/05/23-19:27:46.715119 |
SID: | 2030092 |
Source Port: | 54328 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2393.105.214.22540316802030092 03/05/23-19:29:10.461148 |
SID: | 2030092 |
Source Port: | 40316 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23197.192.184.10536888372152835222 03/05/23-19:28:12.589467 |
SID: | 2835222 |
Source Port: | 36888 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2323.205.195.21041924802030092 03/05/23-19:29:36.807833 |
SID: | 2030092 |
Source Port: | 41924 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23197.194.193.11847902372152835222 03/05/23-19:28:54.919630 |
SID: | 2835222 |
Source Port: | 47902 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23121.207.254.20632984802030092 03/05/23-19:29:08.094572 |
SID: | 2030092 |
Source Port: | 32984 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.164.238.10240726372152835222 03/05/23-19:28:35.580684 |
SID: | 2835222 |
Source Port: | 40726 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2341.152.216.2240122372152835222 03/05/23-19:29:26.012840 |
SID: | 2835222 |
Source Port: | 40122 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23197.194.233.23345060372152835222 03/05/23-19:29:25.958293 |
SID: | 2835222 |
Source Port: | 45060 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.232.19.169.16644420802030092 03/05/23-19:29:20.414400 |
SID: | 2030092 |
Source Port: | 44420 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2347.100.122.5555270802030092 03/05/23-19:29:32.356964 |
SID: | 2030092 |
Source Port: | 55270 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23145.239.5.2138746802030092 03/05/23-19:27:43.652987 |
SID: | 2030092 |
Source Port: | 38746 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2380.255.41.3959296802030092 03/05/23-19:27:59.643976 |
SID: | 2030092 |
Source Port: | 59296 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23109.248.217.9249480802030092 03/05/23-19:27:50.682996 |
SID: | 2030092 |
Source Port: | 49480 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2345.64.227.23337238802030092 03/05/23-19:28:05.030184 |
SID: | 2030092 |
Source Port: | 37238 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.8.239.9446026802030092 03/05/23-19:29:10.882448 |
SID: | 2030092 |
Source Port: | 46026 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.75.25.10746318802030092 03/05/23-19:29:42.621950 |
SID: | 2030092 |
Source Port: | 46318 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2337.144.26.1052914802030092 03/05/23-19:27:59.736265 |
SID: | 2030092 |
Source Port: | 52914 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2335.173.73.13642960802030092 03/05/23-19:28:40.343406 |
SID: | 2030092 |
Source Port: | 42960 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.247.22.22352838372152835222 03/05/23-19:29:13.833009 |
SID: | 2835222 |
Source Port: | 52838 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23156.254.62.3050674372152835222 03/05/23-19:29:31.132494 |
SID: | 2835222 |
Source Port: | 50674 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23156.254.79.6160276372152835222 03/05/23-19:29:19.864863 |
SID: | 2835222 |
Source Port: | 60276 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23156.254.54.23149712372152835222 03/05/23-19:27:44.710139 |
SID: | 2835222 |
Source Port: | 49712 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23156.254.109.16648064372152835222 03/05/23-19:27:51.675176 |
SID: | 2835222 |
Source Port: | 48064 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2341.153.205.17353206372152835222 03/05/23-19:28:28.926640 |
SID: | 2835222 |
Source Port: | 53206 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2341.152.93.8443056372152835222 03/05/23-19:28:31.179235 |
SID: | 2835222 |
Source Port: | 43056 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23212.199.115.20351974802030092 03/05/23-19:29:26.895410 |
SID: | 2030092 |
Source Port: | 51974 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23119.91.47.22548838802030092 03/05/23-19:28:02.426321 |
SID: | 2030092 |
Source Port: | 48838 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2346.242.188.15346442802030092 03/05/23-19:28:57.681620 |
SID: | 2030092 |
Source Port: | 46442 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2385.235.73.1534288802030092 03/05/23-19:28:16.487845 |
SID: | 2030092 |
Source Port: | 34288 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23194.165.49.14458672802030092 03/05/23-19:28:33.500444 |
SID: | 2030092 |
Source Port: | 58672 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23154.31.15.8534322802030092 03/05/23-19:29:23.648629 |
SID: | 2030092 |
Source Port: | 34322 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23155.254.60.24434394802030092 03/05/23-19:29:07.820477 |
SID: | 2030092 |
Source Port: | 34394 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23197.194.224.12756948372152835222 03/05/23-19:29:27.431760 |
SID: | 2835222 |
Source Port: | 56948 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23156.254.33.4237534372152835222 03/05/23-19:28:07.007245 |
SID: | 2835222 |
Source Port: | 37534 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23200.91.192.21634956802030092 03/05/23-19:28:47.772417 |
SID: | 2030092 |
Source Port: | 34956 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2396.17.43.19054894802030092 03/05/23-19:28:57.553128 |
SID: | 2030092 |
Source Port: | 54894 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2320.253.135.4241134802030092 03/05/23-19:28:18.955553 |
SID: | 2030092 |
Source Port: | 41134 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23197.195.20.636314372152835222 03/05/23-19:28:57.229419 |
SID: | 2835222 |
Source Port: | 36314 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23148.101.198.3860912802030092 03/05/23-19:27:43.799830 |
SID: | 2030092 |
Source Port: | 60912 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.235.189.188.13842650802030092 03/05/23-19:27:59.631567 |
SID: | 2030092 |
Source Port: | 42650 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23194.68.44.4237442802030092 03/05/23-19:28:04.748691 |
SID: | 2030092 |
Source Port: | 37442 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2331.207.35.13535636802030092 03/05/23-19:27:49.332938 |
SID: | 2030092 |
Source Port: | 35636 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.104.88.18858904802030092 03/05/23-19:29:30.379341 |
SID: | 2030092 |
Source Port: | 58904 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2396.91.129.8945146802030092 03/05/23-19:28:22.472518 |
SID: | 2030092 |
Source Port: | 45146 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23197.192.28.14634290372152835222 03/05/23-19:28:41.009247 |
SID: | 2835222 |
Source Port: | 34290 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23156.254.87.3855238372152835222 03/05/23-19:29:16.387808 |
SID: | 2835222 |
Source Port: | 55238 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23194.29.186.13349066802030092 03/05/23-19:28:10.428550 |
SID: | 2030092 |
Source Port: | 49066 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23167.235.198.18844432802030092 03/05/23-19:29:39.496868 |
SID: | 2030092 |
Source Port: | 44432 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23196.70.161.5556412802030092 03/05/23-19:29:42.270727 |
SID: | 2030092 |
Source Port: | 56412 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23147.46.84.21148542802030092 03/05/23-19:28:19.039239 |
SID: | 2030092 |
Source Port: | 48542 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2341.153.130.4232916372152835222 03/05/23-19:29:13.643607 |
SID: | 2835222 |
Source Port: | 32916 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23164.88.217.2252218802030092 03/05/23-19:28:33.848528 |
SID: | 2030092 |
Source Port: | 52218 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23153.126.129.9043614802030092 03/05/23-19:28:54.113563 |
SID: | 2030092 |
Source Port: | 43614 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2346.35.247.10845114802030092 03/05/23-19:27:50.733416 |
SID: | 2030092 |
Source Port: | 45114 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2342.125.201.19441364802030092 03/05/23-19:28:53.817056 |
SID: | 2030092 |
Source Port: | 41364 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23220.134.36.23837184802030092 03/05/23-19:29:17.881547 |
SID: | 2030092 |
Source Port: | 37184 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.254.108.13048990372152835222 03/05/23-19:29:36.852711 |
SID: | 2835222 |
Source Port: | 48990 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2381.198.33.12044634802030092 03/05/23-19:28:12.242115 |
SID: | 2030092 |
Source Port: | 44634 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2338.47.130.15737674802030092 03/05/23-19:27:46.998091 |
SID: | 2030092 |
Source Port: | 37674 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2341.152.38.6844094372152835222 03/05/23-19:28:33.331074 |
SID: | 2835222 |
Source Port: | 44094 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23197.193.168.6434530372152835222 03/05/23-19:29:18.522832 |
SID: | 2835222 |
Source Port: | 34530 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2395.89.180.4752714802030092 03/05/23-19:29:31.897716 |
SID: | 2030092 |
Source Port: | 52714 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2386.22.41.7543644802030092 03/05/23-19:28:38.742076 |
SID: | 2030092 |
Source Port: | 43644 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23141.148.235.7160364802030092 03/05/23-19:29:23.535817 |
SID: | 2030092 |
Source Port: | 60364 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2364.146.130.1140292802030092 03/05/23-19:29:23.965989 |
SID: | 2030092 |
Source Port: | 40292 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.251.62.12542156802030092 03/05/23-19:28:41.830352 |
SID: | 2030092 |
Source Port: | 42156 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23103.16.31.13939566802030092 03/05/23-19:29:02.991458 |
SID: | 2030092 |
Source Port: | 39566 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.254.38.2054654372152835222 03/05/23-19:28:46.280499 |
SID: | 2835222 |
Source Port: | 54654 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23125.56.201.12654598802030092 03/05/23-19:29:31.802368 |
SID: | 2030092 |
Source Port: | 54598 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2320.10.120.12954800802030092 03/05/23-19:29:20.617166 |
SID: | 2030092 |
Source Port: | 54800 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23116.197.57.6255482802030092 03/05/23-19:27:43.800990 |
SID: | 2030092 |
Source Port: | 55482 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23195.154.112.7836326802030092 03/05/23-19:28:04.675243 |
SID: | 2030092 |
Source Port: | 36326 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23146.70.123.10245256802030092 03/05/23-19:28:22.392888 |
SID: | 2030092 |
Source Port: | 45256 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2314.71.2.10953638802030092 03/05/23-19:29:02.964760 |
SID: | 2030092 |
Source Port: | 53638 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23197.192.248.1346154372152835222 03/05/23-19:28:12.640963 |
SID: | 2835222 |
Source Port: | 46154 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23154.23.75.1159850802030092 03/05/23-19:29:23.928728 |
SID: | 2030092 |
Source Port: | 59850 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23112.170.253.23258856802030092 03/05/23-19:29:00.176327 |
SID: | 2030092 |
Source Port: | 58856 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.230.195.16359778802030092 03/05/23-19:29:03.048780 |
SID: | 2030092 |
Source Port: | 59778 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.241.12.3835620372152835222 03/05/23-19:29:13.837631 |
SID: | 2835222 |
Source Port: | 35620 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2334.252.57.6241604802030092 03/05/23-19:28:04.754895 |
SID: | 2030092 |
Source Port: | 41604 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.48.2.13460090802030092 03/05/23-19:28:38.690149 |
SID: | 2030092 |
Source Port: | 60090 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23197.192.148.15058754372152835222 03/05/23-19:29:06.521175 |
SID: | 2835222 |
Source Port: | 58754 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23113.181.117.23558754802030092 03/05/23-19:28:45.250894 |
SID: | 2030092 |
Source Port: | 58754 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2313.251.78.3338050802030092 03/05/23-19:28:45.633654 |
SID: | 2030092 |
Source Port: | 38050 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2369.195.94.13346794802030092 03/05/23-19:29:10.573054 |
SID: | 2030092 |
Source Port: | 46794 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23206.222.6.22738312802030092 03/05/23-19:29:17.889477 |
SID: | 2030092 |
Source Port: | 38312 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.104.95.18734650802030092 03/05/23-19:28:53.973057 |
SID: | 2030092 |
Source Port: | 34650 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.198.239.18141544372152835222 03/05/23-19:28:21.441907 |
SID: | 2835222 |
Source Port: | 41544 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23197.192.130.14740102372152835222 03/05/23-19:29:26.038298 |
SID: | 2835222 |
Source Port: | 40102 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.232.21.198.2743098802030092 03/05/23-19:27:50.713429 |
SID: | 2030092 |
Source Port: | 43098 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2334.120.106.4059500802030092 03/05/23-19:29:30.087714 |
SID: | 2030092 |
Source Port: | 59500 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23109.49.160.25460922802030092 03/05/23-19:29:30.236108 |
SID: | 2030092 |
Source Port: | 60922 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23202.82.42.18359524802030092 03/05/23-19:27:43.854290 |
SID: | 2030092 |
Source Port: | 59524 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.253.45.953960372152835222 03/05/23-19:27:47.195822 |
SID: | 2835222 |
Source Port: | 53960 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2369.234.246.1037290802030092 03/05/23-19:28:40.199050 |
SID: | 2030092 |
Source Port: | 37290 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.211.169.8057948802030092 03/05/23-19:27:46.458728 |
SID: | 2030092 |
Source Port: | 57948 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.199.95.5346206802030092 03/05/23-19:28:57.712643 |
SID: | 2030092 |
Source Port: | 46206 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2335.164.134.10939266802030092 03/05/23-19:29:07.918632 |
SID: | 2030092 |
Source Port: | 39266 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23184.87.215.24055154802030092 03/05/23-19:27:58.714096 |
SID: | 2030092 |
Source Port: | 55154 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23197.196.220.559616372152835222 03/05/23-19:28:22.888572 |
SID: | 2835222 |
Source Port: | 59616 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23120.76.69.14049162802030092 03/05/23-19:28:19.058891 |
SID: | 2030092 |
Source Port: | 49162 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2381.88.178.942786802030092 03/05/23-19:29:07.640236 |
SID: | 2030092 |
Source Port: | 42786 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23135.125.186.7358014802030092 03/05/23-19:29:23.619879 |
SID: | 2030092 |
Source Port: | 58014 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23197.194.7.4858550372152835222 03/05/23-19:27:49.323703 |
SID: | 2835222 |
Source Port: | 58550 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23104.248.181.18345552802030092 03/05/23-19:29:13.511473 |
SID: | 2030092 |
Source Port: | 45552 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23197.194.42.23334412372152835222 03/05/23-19:29:34.507718 |
SID: | 2835222 |
Source Port: | 34412 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2352.58.241.1555788802030092 03/05/23-19:28:02.179804 |
SID: | 2030092 |
Source Port: | 55788 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2335.73.75.5352932802030092 03/05/23-19:28:13.829610 |
SID: | 2030092 |
Source Port: | 52932 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2335.163.42.4144642802030092 03/05/23-19:27:43.966906 |
SID: | 2030092 |
Source Port: | 44642 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.254.104.22237490372152835222 03/05/23-19:28:13.131184 |
SID: | 2835222 |
Source Port: | 37490 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23107.172.227.10045476802030092 03/05/23-19:28:30.969185 |
SID: | 2030092 |
Source Port: | 45476 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23197.192.100.3760180372152835222 03/05/23-19:28:12.569485 |
SID: | 2835222 |
Source Port: | 60180 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23197.192.76.9860082372152835222 03/05/23-19:28:35.523627 |
SID: | 2835222 |
Source Port: | 60082 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23197.194.128.1247146372152835222 03/05/23-19:29:27.429613 |
SID: | 2835222 |
Source Port: | 47146 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2323.108.86.9058302802030092 03/05/23-19:28:33.685782 |
SID: | 2030092 |
Source Port: | 58302 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2349.48.67.14549568802030092 03/05/23-19:28:53.729807 |
SID: | 2030092 |
Source Port: | 49568 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.88.151.25144568802030092 03/05/23-19:29:27.012899 |
SID: | 2030092 |
Source Port: | 44568 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23197.197.168.11936446372152835222 03/05/23-19:29:45.882276 |
SID: | 2835222 |
Source Port: | 36446 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2394.196.74.13238212802030092 03/05/23-19:29:10.478551 |
SID: | 2030092 |
Source Port: | 38212 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2318.119.5.2158954802030092 03/05/23-19:28:07.928328 |
SID: | 2030092 |
Source Port: | 58954 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23197.192.114.16753618372152835222 03/05/23-19:28:26.735187 |
SID: | 2835222 |
Source Port: | 53618 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2341.153.241.18542572372152835222 03/05/23-19:28:35.707928 |
SID: | 2835222 |
Source Port: | 42572 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2341.62.179.22153130372152835222 03/05/23-19:28:12.754011 |
SID: | 2835222 |
Source Port: | 53130 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23156.163.18.3748116372152835222 03/05/23-19:28:54.920877 |
SID: | 2835222 |
Source Port: | 48116 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2384.6.175.9233924802030092 03/05/23-19:28:53.636171 |
SID: | 2030092 |
Source Port: | 33924 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23202.148.5.14641302802030092 03/05/23-19:28:07.991730 |
SID: | 2030092 |
Source Port: | 41302 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2398.153.212.13440006802030092 03/05/23-19:28:29.168258 |
SID: | 2030092 |
Source Port: | 40006 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2380.179.128.18138342802030092 03/05/23-19:28:57.548878 |
SID: | 2030092 |
Source Port: | 38342 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23154.23.197.16647608802030092 03/05/23-19:29:10.578641 |
SID: | 2030092 |
Source Port: | 47608 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.247.20.10259960372152835222 03/05/23-19:29:22.271265 |
SID: | 2835222 |
Source Port: | 59960 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23156.241.12.1154214372152835222 03/05/23-19:28:36.263246 |
SID: | 2835222 |
Source Port: | 54214 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23173.82.124.24954396802030092 03/05/23-19:28:47.943125 |
SID: | 2030092 |
Source Port: | 54396 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2318.193.165.10343372802030092 03/05/23-19:29:46.488500 |
SID: | 2030092 |
Source Port: | 43372 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.16.73.6041884802030092 03/05/23-19:28:25.395645 |
SID: | 2030092 |
Source Port: | 41884 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2372.247.200.8047838802030092 03/05/23-19:29:07.649911 |
SID: | 2030092 |
Source Port: | 47838 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.163.247.1533398372152835222 03/05/23-19:29:18.524827 |
SID: | 2835222 |
Source Port: | 33398 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23185.22.60.7239910802030092 03/05/23-19:27:52.903568 |
SID: | 2030092 |
Source Port: | 39910 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2341.234.161.4958428372152835222 03/05/23-19:28:38.782176 |
SID: | 2835222 |
Source Port: | 58428 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23156.254.74.22349822372152835222 03/05/23-19:28:22.833589 |
SID: | 2835222 |
Source Port: | 49822 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.2334.160.49.19657518802030092 03/05/23-19:28:50.284158 |
SID: | 2030092 |
Source Port: | 57518 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.232.132.54.946578802030092 03/05/23-19:29:32.054359 |
SID: | 2030092 |
Source Port: | 46578 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2391.93.132.248552802030092 03/05/23-19:29:42.800475 |
SID: | 2030092 |
Source Port: | 48552 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23154.220.236.15549754802030092 03/05/23-19:27:52.327111 |
SID: | 2030092 |
Source Port: | 49754 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.254.49.243280372152835222 03/05/23-19:29:07.858215 |
SID: | 2835222 |
Source Port: | 43280 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23156.254.107.13950640372152835222 03/05/23-19:29:13.833112 |
SID: | 2835222 |
Source Port: | 50640 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23197.15.219.7657954802030092 03/05/23-19:29:23.528454 |
SID: | 2030092 |
Source Port: | 57954 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2352.193.48.13338746802030092 03/05/23-19:27:54.230150 |
SID: | 2030092 |
Source Port: | 38746 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2335.213.72.13054984802030092 03/05/23-19:28:45.258212 |
SID: | 2030092 |
Source Port: | 54984 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23121.40.138.9642066802030092 03/05/23-19:29:43.126418 |
SID: | 2030092 |
Source Port: | 42066 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2347.104.248.9551744802030092 03/05/23-19:28:57.740709 |
SID: | 2030092 |
Source Port: | 51744 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2390.85.169.7339818802030092 03/05/23-19:29:13.323705 |
SID: | 2030092 |
Source Port: | 39818 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23178.112.137.17358776802030092 03/05/23-19:28:44.807931 |
SID: | 2030092 |
Source Port: | 58776 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.209.10.13357574802030092 03/05/23-19:27:54.128916 |
SID: | 2030092 |
Source Port: | 57574 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23156.254.96.5843960372152835222 03/05/23-19:28:35.732861 |
SID: | 2835222 |
Source Port: | 43960 |
Destination Port: | 37215 |
Protocol: | TCP |
Classtype: | A Network Trojan was detected |
Timestamp: | 192.168.2.23142.93.183.4448702802030092 03/05/23-19:29:42.309343 |
SID: | 2030092 |
Source Port: | 48702 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2391.222.66.2040382802030092 03/05/23-19:29:04.556376 |
SID: | 2030092 |
Source Port: | 40382 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.101.29.10345860802030092 03/05/23-19:29:15.916090 |
SID: | 2030092 |
Source Port: | 45860 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.74.195.8045080802030092 03/05/23-19:28:42.146088 |
SID: | 2030092 |
Source Port: | 45080 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2313.94.28.5356400802030092 03/05/23-19:28:33.979244 |
SID: | 2030092 |
Source Port: | 56400 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2323.78.169.8454554802030092 03/05/23-19:28:41.933998 |
SID: | 2030092 |
Source Port: | 54554 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.2334.254.48.7658766802030092 03/05/23-19:29:15.775765 |
SID: | 2030092 |
Source Port: | 58766 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23104.25.233.20433336802030092 03/05/23-19:28:30.602725 |
SID: | 2030092 |
Source Port: | 33336 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23103.135.100.1343012802030092 03/05/23-19:29:16.330153 |
SID: | 2030092 |
Source Port: | 43012 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
Timestamp: | 192.168.2.23107.191.33.19735484802030092 03/05/23-19:29:33.886416 |
SID: | 2030092 |
Source Port: | 35484 |
Destination Port: | 80 |
Protocol: | TCP |
Classtype: | Web Application Attack |
- • AV Detection
- • Networking
- • System Summary
- • Persistence and Installation Behavior
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Stealing of Sensitive Information
- • Remote Access Functionality
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Networking |
---|
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: | ||
Source: | Snort IDS: |
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | Socket: | Jump to behavior |
Source: | HTTP traffic detected: |