log stringlengths 195 2.49k | label int64 0 1 | class stringclasses 12
values | response stringclasses 12
values |
|---|---|---|---|
event_type: flow, proto: TCP, app_proto: krb5, flow_pkts_toserver: 8, flow_pkts_toclient: 8, flow_bytes_toserver: 946, flow_bytes_toclient: 894, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: Tru... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 148, flow_bytes_toclient: 180, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2732, event_type: dns, proto: UDP, dns_type: query, dns_id: 37338, dns_rrname: DC.Testbed1.ca, dns_rrtype... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: krb5, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 436, flow_bytes_toclient: 442, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 5062, event_type: krb5, proto: UDP, krb5_msg_type: KRB_ERROR, krb5_failed_request: KRB_AS_REQ, krb5_erro... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 170, flow_bytes_toclient: 226, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9501, event_type: dns, proto: UDP, dns_type: query, dns_id: 36793, dns_rrname: 3.10.168.192.in-addr.arpa,... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 148, flow_bytes_toclient: 180, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 10595, event_type: dns, proto: UDP, dns_type: query, dns_id: 26056, dns_rrname: DC.Testbed1.ca, dns_rrtyp... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 130, flow_bytes_toclient: 130, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 14243, event_type: dns, proto: UDP, dns_type: query, dns_id: 27070, dns_rrname: macpc, dns_rrtype: A, dns... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 172, flow_bytes_toclient: 272, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 14436, event_type: dns, proto: UDP, dns_type: query, dns_id: 29884, dns_rrname: _kerberos._tcp.TESTBED1.C... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 186, flow_bytes_toclient: 308, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 14835, event_type: dns, proto: UDP, dns_type: query, dns_id: 40178, dns_rrname: _kerberos-master._udp.TES... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 21, flow_pkts_toclient: 21, flow_bytes_toserver: 1986, flow_bytes_toclient: 7849, flow_age: 116, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 29, flow_pkts_toclient: 29, flow_bytes_toserver: 3491, flow_bytes_toclient: 21210, flow_age: 120, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ac... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 22, flow_pkts_toclient: 16, flow_bytes_toserver: 6350, flow_bytes_toclient: 8014, flow_age: 17, flow_state: established, flow_reason: timeout, tcp_tcp_flags: 1a, tcp_tcp_flags_ts: 1a, tcp_tcp_flags_tc: 1a, tcp_syn: True, tcp_psh: True, tcp_ack: True, tcp... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 172, flow_bytes_toclient: 272, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 25176, event_type: dns, proto: UDP, dns_type: query, dns_id: 1658, dns_rrname: _kerberos._tcp.TESTBED1.CA... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 97, flow_bytes_toclient: 160, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 25547, event_type: dns, proto: UDP, dns_type: query, dns_id: 6388, dns_rrname: 150.59.148.54.in-addr.arpa,... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 172, flow_bytes_toclient: 298, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 25545, event_type: dns, proto: UDP, dns_type: query, dns_id: 61783, dns_rrname: 150.59.148.54.in-addr.arp... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: ntp, flow_pkts_toserver: 49, flow_pkts_toclient: 49, flow_bytes_toserver: 4410, flow_bytes_toclient: 4410, flow_age: 4781, flow_state: established, flow_reason: timeout | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 172, flow_bytes_toclient: 272, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 40364, event_type: dns, proto: UDP, dns_type: query, dns_id: 61702, dns_rrname: _kerberos._udp.TESTBED1.C... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 148, flow_bytes_toclient: 180, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 43289, event_type: dns, proto: UDP, dns_type: query, dns_id: 17945, dns_rrname: DC.Testbed1.ca, dns_rrtyp... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 14, flow_pkts_toclient: 16, flow_bytes_toserver: 2022, flow_bytes_toclient: 10652, flow_age: 17, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 162, flow_bytes_toclient: 194, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 49579, event_type: dns, proto: UDP, dns_type: query, dns_id: 38272, dns_rrname: scontent.xx.fbcdn.net, dn... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 178, flow_bytes_toclient: 280, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 49387, event_type: dns, proto: UDP, dns_type: query, dns_id: 16191, dns_rrname: safebrowsing-cache.google... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 98, flow_bytes_toclient: 155, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 53207, event_type: dns, proto: UDP, dns_type: query, dns_id: 54066, dns_rrname: 131.66.163.152.in-addr.arp... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 178, flow_bytes_toclient: 280, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 52438, event_type: dns, proto: UDP, dns_type: query, dns_id: 24139, dns_rrname: safebrowsing-cache.google... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 152, flow_bytes_toclient: 264, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 53538, event_type: dns, proto: UDP, dns_type: query, dns_id: 28100, dns_rrname: adx.districtm.ca, dns_rrt... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 172, flow_bytes_toclient: 280, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 54644, event_type: dns, proto: UDP, dns_type: query, dns_id: 42692, dns_rrname: 27.33.132.192.in-addr.arp... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 158, flow_bytes_toclient: 190, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 55330, event_type: dns, proto: UDP, dns_type: query, dns_id: 13237, dns_rrname: pixel.sitescout.com, dns_... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 168, flow_bytes_toclient: 274, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 56641, event_type: dns, proto: UDP, dns_type: query, dns_id: 45660, dns_rrname: 62.222.0.52.in-addr.arpa,... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 160, flow_bytes_toclient: 264, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 62762, event_type: dns, proto: UDP, dns_type: query, dns_id: 62587, dns_rrname: fonts.googleapis.com, dns... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 44, flow_pkts_toclient: 52, flow_bytes_toserver: 4661, flow_bytes_toclient: 72699, flow_age: 116, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1f, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_ps... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 166, flow_bytes_toclient: 198, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 62792, event_type: dns, proto: UDP, dns_type: query, dns_id: 10916, dns_rrname: e11100.g.akamaiedge.net, ... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, flow_pkts_toserver: 5, flow_pkts_toclient: 3, flow_bytes_toserver: 338, flow_bytes_toclient: 214, flow_age: 6, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 13, tcp_tcp_flags_ts: 13, tcp_tcp_flags_tc: 13, tcp_syn: True, tcp_fin: True, tcp_ack: True, tcp_state: closed | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 250, flow_bytes_toclient: 414, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 68671, event_type: dns, proto: UDP, dns_type: query, dns_id: 16978, dns_rrname: privacycollector-producti... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 5, flow_bytes_toserver: 765, flow_bytes_toclient: 2603, flow_age: 1, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 13, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: Tr... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 93, flow_bytes_toclient: 240, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 70985, event_type: dns, proto: UDP, dns_type: query, dns_id: 11028, dns_rrname: cdn-us-east.velaro.com, dn... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, app_proto: krb5, flow_pkts_toserver: 8, flow_pkts_toclient: 8, flow_bytes_toserver: 932, flow_bytes_toclient: 850, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: Tru... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 170, flow_bytes_toclient: 202, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 84988, event_type: dns, proto: UDP, dns_type: query, dns_id: 44178, dns_rrname: e6913.dscx.akamaiedge.net... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 96, flow_bytes_toclient: 151, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 87503, event_type: dns, proto: UDP, dns_type: query, dns_id: 29659, dns_rrname: 28.37.192.54.in-addr.arpa,... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 164, flow_bytes_toclient: 196, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 88566, event_type: dns, proto: UDP, dns_type: query, dns_id: 19022, dns_rrname: e9690.b.akamaiedge.net, d... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 152, flow_bytes_toclient: 244, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 89751, event_type: dns, proto: UDP, dns_type: query, dns_id: 64762, dns_rrname: books.disney.com, dns_rrt... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 158, flow_bytes_toclient: 190, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 89813, event_type: dns, proto: UDP, dns_type: query, dns_id: 4049, dns_rrname: www.disneyonice.com, dns_r... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 184, flow_bytes_toclient: 240, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 90002, event_type: dns, proto: UDP, dns_type: query, dns_id: 7165, dns_rrname: pagead-googlehosted.l.goog... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 186, flow_bytes_toclient: 308, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 93901, event_type: dns, proto: UDP, dns_type: query, dns_id: 57463, dns_rrname: _kerberos-master._tcp.TES... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 112, flow_bytes_toclient: 176, flow_age: 1, flow_state: established, flow_reason: timeout ; pcap_cnt: 94725, event_type: dns, proto: UDP, dns_type: query, dns_id: 1702, dns_rrname: dmd.metaservices.microsoft... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 96, flow_bytes_toclient: 175, flow_age: 1, flow_state: established, flow_reason: timeout ; pcap_cnt: 94902, event_type: dns, proto: UDP, dns_type: query, dns_id: 45142, dns_rrname: 27.145.80.40.in-addr.arpa,... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 4, flow_pkts_toclient: 2, flow_bytes_toserver: 348, flow_bytes_toclient: 310, flow_age: 1, flow_state: established, flow_reason: timeout ; pcap_cnt: 95086, event_type: dns, proto: UDP, dns_type: query, dns_id: 51147, dns_rrname: 189.58.170.134.in-addr.ar... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, flow_pkts_toserver: 3, flow_pkts_toclient: 2, flow_bytes_toserver: 186, flow_bytes_toclient: 120, flow_age: 45, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 16, tcp_tcp_flags_ts: 12, tcp_tcp_flags_tc: 16, tcp_syn: True, tcp_rst: True, tcp_ack: True, tcp_state: closed | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 90, flow_bytes_toclient: 154, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 104496, event_type: dns, proto: UDP, dns_type: query, dns_id: 9321, dns_rrname: support.mozilla.org, dns_r... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 238, flow_bytes_toclient: 394, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 114122, event_type: dns, proto: UDP, dns_type: query, dns_id: 1193, dns_rrname: normandy-cdn-elb-prod-787... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 8, flow_pkts_toclient: 8, flow_bytes_toserver: 1069, flow_bytes_toclient: 3299, flow_age: 8, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: T... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 164, flow_bytes_toclient: 282, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 119666, event_type: dns, proto: UDP, dns_type: query, dns_id: 61069, dns_rrname: img2.tmon.kr.cdngc.net, ... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 85, flow_bytes_toclient: 113, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 123290, event_type: dns, proto: UDP, dns_type: query, dns_id: 28502, dns_rrname: www.google.com, dns_rrtyp... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 83, flow_bytes_toclient: 175, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 199055, event_type: dns, proto: UDP, dns_type: query, dns_id: 25222, dns_rrname: bat.bing.com, dns_rrtype:... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 172, flow_bytes_toclient: 260, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 349665, event_type: dns, proto: UDP, dns_type: query, dns_id: 44468, dns_rrname: marketing.citrixonline.c... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 168, flow_bytes_toclient: 276, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 359055, event_type: dns, proto: UDP, dns_type: query, dns_id: 32627, dns_rrname: www.googleadservices.com... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 168, flow_bytes_toclient: 288, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 359333, event_type: dns, proto: UDP, dns_type: query, dns_id: 63429, dns_rrname: www.google-analytics.com... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 19, flow_pkts_toclient: 18, flow_bytes_toserver: 2218, flow_bytes_toclient: 9378, flow_age: 66, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack:... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 91, flow_bytes_toclient: 219, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 364445, event_type: dns, proto: UDP, dns_type: query, dns_id: 44875, dns_rrname: ib.anycast.adnxs.com, dns... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 102, flow_pkts_toclient: 57, flow_bytes_toserver: 27174, flow_bytes_toclient: 13432, flow_age: 894, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 146, flow_bytes_toclient: 258, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 450624, event_type: dns, proto: UDP, dns_type: query, dns_id: 56331, dns_rrname: t.a3cloud.net, dns_rrtyp... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 104, flow_bytes_toclient: 231, flow_age: 1, flow_state: established, flow_reason: timeout ; pcap_cnt: 451977, event_type: dns, proto: UDP, dns_type: query, dns_id: 24719, dns_rrname: content-signature.cdn.mo... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 174, flow_bytes_toclient: 286, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 492079, event_type: dns, proto: UDP, dns_type: query, dns_id: 44668, dns_rrname: 233.178.235.54.in-addr.a... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 85, flow_bytes_toclient: 101, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 495202, event_type: dns, proto: UDP, dns_type: query, dns_id: 60237, dns_rrname: rp.gwallet.com, dns_rrtyp... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 10, flow_pkts_toclient: 9, flow_bytes_toserver: 931, flow_bytes_toclient: 6445, flow_age: 6, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1f, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: Tr... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 148, flow_bytes_toclient: 180, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 496305, event_type: dns, proto: UDP, dns_type: query, dns_id: 59832, dns_rrname: rs.gwallet.com, dns_rrty... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 93, flow_bytes_toclient: 109, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 496200, event_type: dns, proto: UDP, dns_type: query, dns_id: 28842, dns_rrname: e6791.b.akamaiedge.net, d... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 146, flow_bytes_toclient: 242, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 534554, event_type: dns, proto: UDP, dns_type: query, dns_id: 62572, dns_rrname: cent.spots.im, dns_rrtyp... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 11, flow_pkts_toclient: 9, flow_bytes_toserver: 1027, flow_bytes_toclient: 778, flow_age: 6, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1f, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: Tr... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 21, flow_pkts_toclient: 18, flow_bytes_toserver: 4229, flow_bytes_toclient: 2387, flow_age: 116, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1f, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 182, flow_bytes_toclient: 366, flow_age: 145, flow_state: established, flow_reason: timeout ; pcap_cnt: 685746, event_type: dns, proto: UDP, dns_type: query, dns_id: 32277, dns_rrname: p.rfihub.com, dns_rrty... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 158, flow_bytes_toclient: 190, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 853749, event_type: dns, proto: UDP, dns_type: query, dns_id: 19221, dns_rrname: redirector.gvt1.com, dns... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 172, flow_bytes_toclient: 312, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1035074, event_type: dns, proto: UDP, dns_type: query, dns_id: 7050, dns_rrname: 238.6.217.172.in-addr.ar... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 150, flow_bytes_toclient: 286, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1131279, event_type: dns, proto: UDP, dns_type: query, dns_id: 9329, dns_rrname: ana.112.2o7.net, dns_rrt... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 5, flow_bytes_toserver: 795, flow_bytes_toclient: 3082, flow_age: 11, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 13, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: T... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 98, flow_bytes_toclient: 164, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1157692, event_type: dns, proto: UDP, dns_type: query, dns_id: 35136, dns_rrname: fb-ret-list-lb03.appier.... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 16, flow_pkts_toclient: 12, flow_bytes_toserver: 1549, flow_bytes_toclient: 4996, flow_age: 1, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1f, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: ... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 152, flow_bytes_toclient: 244, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1167634, event_type: dns, proto: UDP, dns_type: query, dns_id: 34352, dns_rrname: k.streamrail.com, dns_r... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 9, flow_pkts_toclient: 8, flow_bytes_toserver: 1724, flow_bytes_toclient: 1213, flow_age: 1, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1e, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: Tr... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, app_proto: krb5, flow_pkts_toserver: 8, flow_pkts_toclient: 10, flow_bytes_toserver: 3452, flow_bytes_toclient: 3504, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 13, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: ... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 21, flow_pkts_toclient: 19, flow_bytes_toserver: 2446, flow_bytes_toclient: 1856, flow_age: 116, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 122, flow_bytes_toclient: 200, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1287272, event_type: dns, proto: UDP, dns_type: query, dns_id: 15320, dns_rrname: dcs-edge-usw2-620097651... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 204, flow_bytes_toclient: 340, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1300856, event_type: dns, proto: UDP, dns_type: query, dns_id: 44980, dns_rrname: ec2-54-236-254-146.comp... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 178, flow_bytes_toclient: 352, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1319662, event_type: dns, proto: UDP, dns_type: query, dns_id: 1858, dns_rrname: d2mb2l2ls1y7ht.cloudfron... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 98, flow_bytes_toclient: 114, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1320705, event_type: dns, proto: UDP, dns_type: query, dns_id: 19538, dns_rrname: star-mini.c10r.facebook.... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 154, flow_bytes_toclient: 210, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1322681, event_type: dns, proto: UDP, dns_type: query, dns_id: 8836, dns_rrname: ocsp.comodoca.com, dns_r... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 162, flow_bytes_toclient: 194, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1583722, event_type: dns, proto: UDP, dns_type: query, dns_id: 12806, dns_rrname: press.gettyimages.com, ... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 17, flow_pkts_toclient: 15, flow_bytes_toserver: 1783, flow_bytes_toclient: 2970, flow_age: 116, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 13, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ac... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 146, flow_bytes_toclient: 260, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1735499, event_type: dns, proto: UDP, dns_type: query, dns_id: 28831, dns_rrname: carbonads.net, dns_rrty... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 15, flow_pkts_toclient: 13, flow_bytes_toserver: 2171, flow_bytes_toclient: 5328, flow_age: 32, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack:... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 18, flow_pkts_toclient: 21, flow_bytes_toserver: 1763, flow_bytes_toclient: 17130, flow_age: 305, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1f, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_ps... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 168, flow_bytes_toclient: 256, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2020271, event_type: dns, proto: UDP, dns_type: query, dns_id: 47895, dns_rrname: 12.80.13.31.in-addr.arp... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 3, flow_pkts_toclient: 3, flow_bytes_toserver: 297, flow_bytes_toclient: 412, flow_age: 21, flow_state: established, flow_reason: timeout ; pcap_cnt: 2028185, event_type: dns, proto: UDP, dns_type: query, dns_id: 65497, dns_rrname: pagead-googlehosted.l.... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 154, flow_bytes_toclient: 242, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2045174, event_type: dns, proto: UDP, dns_type: query, dns_id: 22693, dns_rrname: widget.criteo.com, dns_... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 154, flow_pkts_toclient: 221, flow_bytes_toserver: 26840, flow_bytes_toclient: 114683, flow_age: 680, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tc... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 3, flow_pkts_toclient: 4, flow_bytes_toserver: 1553, flow_bytes_toclient: 1606, flow_age: 1, flow_state: established, flow_reason: timeout | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 18, flow_pkts_toclient: 15, flow_bytes_toserver: 4656, flow_bytes_toclient: 7636, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: ... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 24, flow_pkts_toclient: 23, flow_bytes_toserver: 2718, flow_bytes_toclient: 5570, flow_age: 117, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 214, flow_bytes_toclient: 368, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2050651, event_type: dns, proto: UDP, dns_type: query, dns_id: 779, dns_rrname: idaas-production.us-east-... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 148, flow_bytes_toclient: 242, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2054290, event_type: dns, proto: UDP, dns_type: query, dns_id: 48812, dns_rrname: DC.Testbed1.ca, dns_rrt... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 174, flow_bytes_toclient: 206, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2051947, event_type: dns, proto: UDP, dns_type: query, dns_id: 32813, dns_rrname: ips-invite.iperceptions... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 174, flow_bytes_toclient: 286, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2084997, event_type: dns, proto: UDP, dns_type: query, dns_id: 59658, dns_rrname: 183.165.230.34.in-addr.... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 148, flow_bytes_toclient: 242, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2164507, event_type: dns, proto: UDP, dns_type: query, dns_id: 44972, dns_rrname: DC.Testbed1.ca, dns_rrt... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
End of preview. Expand in Data Studio
README.md exists but content is empty.
- Downloads last month
- 12