log
stringlengths
195
2.49k
label
int64
0
1
class
stringclasses
12 values
response
stringclasses
12 values
event_type: flow, proto: TCP, app_proto: krb5, flow_pkts_toserver: 8, flow_pkts_toclient: 8, flow_bytes_toserver: 946, flow_bytes_toclient: 894, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: Tru...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 148, flow_bytes_toclient: 180, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2732, event_type: dns, proto: UDP, dns_type: query, dns_id: 37338, dns_rrname: DC.Testbed1.ca, dns_rrtype...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: krb5, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 436, flow_bytes_toclient: 442, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 5062, event_type: krb5, proto: UDP, krb5_msg_type: KRB_ERROR, krb5_failed_request: KRB_AS_REQ, krb5_erro...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 170, flow_bytes_toclient: 226, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9501, event_type: dns, proto: UDP, dns_type: query, dns_id: 36793, dns_rrname: 3.10.168.192.in-addr.arpa,...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 148, flow_bytes_toclient: 180, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 10595, event_type: dns, proto: UDP, dns_type: query, dns_id: 26056, dns_rrname: DC.Testbed1.ca, dns_rrtyp...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 130, flow_bytes_toclient: 130, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 14243, event_type: dns, proto: UDP, dns_type: query, dns_id: 27070, dns_rrname: macpc, dns_rrtype: A, dns...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 172, flow_bytes_toclient: 272, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 14436, event_type: dns, proto: UDP, dns_type: query, dns_id: 29884, dns_rrname: _kerberos._tcp.TESTBED1.C...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 186, flow_bytes_toclient: 308, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 14835, event_type: dns, proto: UDP, dns_type: query, dns_id: 40178, dns_rrname: _kerberos-master._udp.TES...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 21, flow_pkts_toclient: 21, flow_bytes_toserver: 1986, flow_bytes_toclient: 7849, flow_age: 116, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 29, flow_pkts_toclient: 29, flow_bytes_toserver: 3491, flow_bytes_toclient: 21210, flow_age: 120, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ac...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 22, flow_pkts_toclient: 16, flow_bytes_toserver: 6350, flow_bytes_toclient: 8014, flow_age: 17, flow_state: established, flow_reason: timeout, tcp_tcp_flags: 1a, tcp_tcp_flags_ts: 1a, tcp_tcp_flags_tc: 1a, tcp_syn: True, tcp_psh: True, tcp_ack: True, tcp...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 172, flow_bytes_toclient: 272, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 25176, event_type: dns, proto: UDP, dns_type: query, dns_id: 1658, dns_rrname: _kerberos._tcp.TESTBED1.CA...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 97, flow_bytes_toclient: 160, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 25547, event_type: dns, proto: UDP, dns_type: query, dns_id: 6388, dns_rrname: 150.59.148.54.in-addr.arpa,...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 172, flow_bytes_toclient: 298, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 25545, event_type: dns, proto: UDP, dns_type: query, dns_id: 61783, dns_rrname: 150.59.148.54.in-addr.arp...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: ntp, flow_pkts_toserver: 49, flow_pkts_toclient: 49, flow_bytes_toserver: 4410, flow_bytes_toclient: 4410, flow_age: 4781, flow_state: established, flow_reason: timeout
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 172, flow_bytes_toclient: 272, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 40364, event_type: dns, proto: UDP, dns_type: query, dns_id: 61702, dns_rrname: _kerberos._udp.TESTBED1.C...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 148, flow_bytes_toclient: 180, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 43289, event_type: dns, proto: UDP, dns_type: query, dns_id: 17945, dns_rrname: DC.Testbed1.ca, dns_rrtyp...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 14, flow_pkts_toclient: 16, flow_bytes_toserver: 2022, flow_bytes_toclient: 10652, flow_age: 17, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 162, flow_bytes_toclient: 194, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 49579, event_type: dns, proto: UDP, dns_type: query, dns_id: 38272, dns_rrname: scontent.xx.fbcdn.net, dn...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 178, flow_bytes_toclient: 280, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 49387, event_type: dns, proto: UDP, dns_type: query, dns_id: 16191, dns_rrname: safebrowsing-cache.google...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 98, flow_bytes_toclient: 155, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 53207, event_type: dns, proto: UDP, dns_type: query, dns_id: 54066, dns_rrname: 131.66.163.152.in-addr.arp...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 178, flow_bytes_toclient: 280, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 52438, event_type: dns, proto: UDP, dns_type: query, dns_id: 24139, dns_rrname: safebrowsing-cache.google...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 152, flow_bytes_toclient: 264, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 53538, event_type: dns, proto: UDP, dns_type: query, dns_id: 28100, dns_rrname: adx.districtm.ca, dns_rrt...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 172, flow_bytes_toclient: 280, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 54644, event_type: dns, proto: UDP, dns_type: query, dns_id: 42692, dns_rrname: 27.33.132.192.in-addr.arp...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 158, flow_bytes_toclient: 190, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 55330, event_type: dns, proto: UDP, dns_type: query, dns_id: 13237, dns_rrname: pixel.sitescout.com, dns_...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 168, flow_bytes_toclient: 274, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 56641, event_type: dns, proto: UDP, dns_type: query, dns_id: 45660, dns_rrname: 62.222.0.52.in-addr.arpa,...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 160, flow_bytes_toclient: 264, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 62762, event_type: dns, proto: UDP, dns_type: query, dns_id: 62587, dns_rrname: fonts.googleapis.com, dns...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 44, flow_pkts_toclient: 52, flow_bytes_toserver: 4661, flow_bytes_toclient: 72699, flow_age: 116, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1f, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_ps...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 166, flow_bytes_toclient: 198, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 62792, event_type: dns, proto: UDP, dns_type: query, dns_id: 10916, dns_rrname: e11100.g.akamaiedge.net, ...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: TCP, flow_pkts_toserver: 5, flow_pkts_toclient: 3, flow_bytes_toserver: 338, flow_bytes_toclient: 214, flow_age: 6, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 13, tcp_tcp_flags_ts: 13, tcp_tcp_flags_tc: 13, tcp_syn: True, tcp_fin: True, tcp_ack: True, tcp_state: closed
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 250, flow_bytes_toclient: 414, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 68671, event_type: dns, proto: UDP, dns_type: query, dns_id: 16978, dns_rrname: privacycollector-producti...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 5, flow_bytes_toserver: 765, flow_bytes_toclient: 2603, flow_age: 1, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 13, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: Tr...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 93, flow_bytes_toclient: 240, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 70985, event_type: dns, proto: UDP, dns_type: query, dns_id: 11028, dns_rrname: cdn-us-east.velaro.com, dn...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: TCP, app_proto: krb5, flow_pkts_toserver: 8, flow_pkts_toclient: 8, flow_bytes_toserver: 932, flow_bytes_toclient: 850, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: Tru...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 170, flow_bytes_toclient: 202, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 84988, event_type: dns, proto: UDP, dns_type: query, dns_id: 44178, dns_rrname: e6913.dscx.akamaiedge.net...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 96, flow_bytes_toclient: 151, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 87503, event_type: dns, proto: UDP, dns_type: query, dns_id: 29659, dns_rrname: 28.37.192.54.in-addr.arpa,...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 164, flow_bytes_toclient: 196, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 88566, event_type: dns, proto: UDP, dns_type: query, dns_id: 19022, dns_rrname: e9690.b.akamaiedge.net, d...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 152, flow_bytes_toclient: 244, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 89751, event_type: dns, proto: UDP, dns_type: query, dns_id: 64762, dns_rrname: books.disney.com, dns_rrt...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 158, flow_bytes_toclient: 190, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 89813, event_type: dns, proto: UDP, dns_type: query, dns_id: 4049, dns_rrname: www.disneyonice.com, dns_r...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 184, flow_bytes_toclient: 240, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 90002, event_type: dns, proto: UDP, dns_type: query, dns_id: 7165, dns_rrname: pagead-googlehosted.l.goog...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 186, flow_bytes_toclient: 308, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 93901, event_type: dns, proto: UDP, dns_type: query, dns_id: 57463, dns_rrname: _kerberos-master._tcp.TES...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 112, flow_bytes_toclient: 176, flow_age: 1, flow_state: established, flow_reason: timeout ; pcap_cnt: 94725, event_type: dns, proto: UDP, dns_type: query, dns_id: 1702, dns_rrname: dmd.metaservices.microsoft...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 96, flow_bytes_toclient: 175, flow_age: 1, flow_state: established, flow_reason: timeout ; pcap_cnt: 94902, event_type: dns, proto: UDP, dns_type: query, dns_id: 45142, dns_rrname: 27.145.80.40.in-addr.arpa,...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 4, flow_pkts_toclient: 2, flow_bytes_toserver: 348, flow_bytes_toclient: 310, flow_age: 1, flow_state: established, flow_reason: timeout ; pcap_cnt: 95086, event_type: dns, proto: UDP, dns_type: query, dns_id: 51147, dns_rrname: 189.58.170.134.in-addr.ar...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: TCP, flow_pkts_toserver: 3, flow_pkts_toclient: 2, flow_bytes_toserver: 186, flow_bytes_toclient: 120, flow_age: 45, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 16, tcp_tcp_flags_ts: 12, tcp_tcp_flags_tc: 16, tcp_syn: True, tcp_rst: True, tcp_ack: True, tcp_state: closed
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 90, flow_bytes_toclient: 154, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 104496, event_type: dns, proto: UDP, dns_type: query, dns_id: 9321, dns_rrname: support.mozilla.org, dns_r...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 238, flow_bytes_toclient: 394, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 114122, event_type: dns, proto: UDP, dns_type: query, dns_id: 1193, dns_rrname: normandy-cdn-elb-prod-787...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 8, flow_pkts_toclient: 8, flow_bytes_toserver: 1069, flow_bytes_toclient: 3299, flow_age: 8, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: T...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 164, flow_bytes_toclient: 282, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 119666, event_type: dns, proto: UDP, dns_type: query, dns_id: 61069, dns_rrname: img2.tmon.kr.cdngc.net, ...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 85, flow_bytes_toclient: 113, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 123290, event_type: dns, proto: UDP, dns_type: query, dns_id: 28502, dns_rrname: www.google.com, dns_rrtyp...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 83, flow_bytes_toclient: 175, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 199055, event_type: dns, proto: UDP, dns_type: query, dns_id: 25222, dns_rrname: bat.bing.com, dns_rrtype:...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 172, flow_bytes_toclient: 260, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 349665, event_type: dns, proto: UDP, dns_type: query, dns_id: 44468, dns_rrname: marketing.citrixonline.c...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 168, flow_bytes_toclient: 276, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 359055, event_type: dns, proto: UDP, dns_type: query, dns_id: 32627, dns_rrname: www.googleadservices.com...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 168, flow_bytes_toclient: 288, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 359333, event_type: dns, proto: UDP, dns_type: query, dns_id: 63429, dns_rrname: www.google-analytics.com...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 19, flow_pkts_toclient: 18, flow_bytes_toserver: 2218, flow_bytes_toclient: 9378, flow_age: 66, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack:...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 91, flow_bytes_toclient: 219, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 364445, event_type: dns, proto: UDP, dns_type: query, dns_id: 44875, dns_rrname: ib.anycast.adnxs.com, dns...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 102, flow_pkts_toclient: 57, flow_bytes_toserver: 27174, flow_bytes_toclient: 13432, flow_age: 894, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 146, flow_bytes_toclient: 258, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 450624, event_type: dns, proto: UDP, dns_type: query, dns_id: 56331, dns_rrname: t.a3cloud.net, dns_rrtyp...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 104, flow_bytes_toclient: 231, flow_age: 1, flow_state: established, flow_reason: timeout ; pcap_cnt: 451977, event_type: dns, proto: UDP, dns_type: query, dns_id: 24719, dns_rrname: content-signature.cdn.mo...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 174, flow_bytes_toclient: 286, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 492079, event_type: dns, proto: UDP, dns_type: query, dns_id: 44668, dns_rrname: 233.178.235.54.in-addr.a...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 85, flow_bytes_toclient: 101, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 495202, event_type: dns, proto: UDP, dns_type: query, dns_id: 60237, dns_rrname: rp.gwallet.com, dns_rrtyp...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 10, flow_pkts_toclient: 9, flow_bytes_toserver: 931, flow_bytes_toclient: 6445, flow_age: 6, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1f, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: Tr...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 148, flow_bytes_toclient: 180, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 496305, event_type: dns, proto: UDP, dns_type: query, dns_id: 59832, dns_rrname: rs.gwallet.com, dns_rrty...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 93, flow_bytes_toclient: 109, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 496200, event_type: dns, proto: UDP, dns_type: query, dns_id: 28842, dns_rrname: e6791.b.akamaiedge.net, d...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 146, flow_bytes_toclient: 242, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 534554, event_type: dns, proto: UDP, dns_type: query, dns_id: 62572, dns_rrname: cent.spots.im, dns_rrtyp...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 11, flow_pkts_toclient: 9, flow_bytes_toserver: 1027, flow_bytes_toclient: 778, flow_age: 6, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1f, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: Tr...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 21, flow_pkts_toclient: 18, flow_bytes_toserver: 4229, flow_bytes_toclient: 2387, flow_age: 116, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1f, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 182, flow_bytes_toclient: 366, flow_age: 145, flow_state: established, flow_reason: timeout ; pcap_cnt: 685746, event_type: dns, proto: UDP, dns_type: query, dns_id: 32277, dns_rrname: p.rfihub.com, dns_rrty...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 158, flow_bytes_toclient: 190, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 853749, event_type: dns, proto: UDP, dns_type: query, dns_id: 19221, dns_rrname: redirector.gvt1.com, dns...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 172, flow_bytes_toclient: 312, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1035074, event_type: dns, proto: UDP, dns_type: query, dns_id: 7050, dns_rrname: 238.6.217.172.in-addr.ar...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 150, flow_bytes_toclient: 286, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1131279, event_type: dns, proto: UDP, dns_type: query, dns_id: 9329, dns_rrname: ana.112.2o7.net, dns_rrt...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 5, flow_bytes_toserver: 795, flow_bytes_toclient: 3082, flow_age: 11, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 13, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: T...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 98, flow_bytes_toclient: 164, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1157692, event_type: dns, proto: UDP, dns_type: query, dns_id: 35136, dns_rrname: fb-ret-list-lb03.appier....
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 16, flow_pkts_toclient: 12, flow_bytes_toserver: 1549, flow_bytes_toclient: 4996, flow_age: 1, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1f, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: ...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 152, flow_bytes_toclient: 244, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1167634, event_type: dns, proto: UDP, dns_type: query, dns_id: 34352, dns_rrname: k.streamrail.com, dns_r...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 9, flow_pkts_toclient: 8, flow_bytes_toserver: 1724, flow_bytes_toclient: 1213, flow_age: 1, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1e, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: Tr...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: TCP, app_proto: krb5, flow_pkts_toserver: 8, flow_pkts_toclient: 10, flow_bytes_toserver: 3452, flow_bytes_toclient: 3504, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 13, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: ...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 21, flow_pkts_toclient: 19, flow_bytes_toserver: 2446, flow_bytes_toclient: 1856, flow_age: 116, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 122, flow_bytes_toclient: 200, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1287272, event_type: dns, proto: UDP, dns_type: query, dns_id: 15320, dns_rrname: dcs-edge-usw2-620097651...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 204, flow_bytes_toclient: 340, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1300856, event_type: dns, proto: UDP, dns_type: query, dns_id: 44980, dns_rrname: ec2-54-236-254-146.comp...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 178, flow_bytes_toclient: 352, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1319662, event_type: dns, proto: UDP, dns_type: query, dns_id: 1858, dns_rrname: d2mb2l2ls1y7ht.cloudfron...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 98, flow_bytes_toclient: 114, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1320705, event_type: dns, proto: UDP, dns_type: query, dns_id: 19538, dns_rrname: star-mini.c10r.facebook....
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 154, flow_bytes_toclient: 210, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1322681, event_type: dns, proto: UDP, dns_type: query, dns_id: 8836, dns_rrname: ocsp.comodoca.com, dns_r...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 162, flow_bytes_toclient: 194, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1583722, event_type: dns, proto: UDP, dns_type: query, dns_id: 12806, dns_rrname: press.gettyimages.com, ...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 17, flow_pkts_toclient: 15, flow_bytes_toserver: 1783, flow_bytes_toclient: 2970, flow_age: 116, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 13, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ac...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 146, flow_bytes_toclient: 260, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1735499, event_type: dns, proto: UDP, dns_type: query, dns_id: 28831, dns_rrname: carbonads.net, dns_rrty...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 15, flow_pkts_toclient: 13, flow_bytes_toserver: 2171, flow_bytes_toclient: 5328, flow_age: 32, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack:...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 18, flow_pkts_toclient: 21, flow_bytes_toserver: 1763, flow_bytes_toclient: 17130, flow_age: 305, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1f, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_ps...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 168, flow_bytes_toclient: 256, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2020271, event_type: dns, proto: UDP, dns_type: query, dns_id: 47895, dns_rrname: 12.80.13.31.in-addr.arp...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 3, flow_pkts_toclient: 3, flow_bytes_toserver: 297, flow_bytes_toclient: 412, flow_age: 21, flow_state: established, flow_reason: timeout ; pcap_cnt: 2028185, event_type: dns, proto: UDP, dns_type: query, dns_id: 65497, dns_rrname: pagead-googlehosted.l....
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 154, flow_bytes_toclient: 242, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2045174, event_type: dns, proto: UDP, dns_type: query, dns_id: 22693, dns_rrname: widget.criteo.com, dns_...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 154, flow_pkts_toclient: 221, flow_bytes_toserver: 26840, flow_bytes_toclient: 114683, flow_age: 680, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tc...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 3, flow_pkts_toclient: 4, flow_bytes_toserver: 1553, flow_bytes_toclient: 1606, flow_age: 1, flow_state: established, flow_reason: timeout
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 18, flow_pkts_toclient: 15, flow_bytes_toserver: 4656, flow_bytes_toclient: 7636, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: ...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 24, flow_pkts_toclient: 23, flow_bytes_toserver: 2718, flow_bytes_toclient: 5570, flow_age: 117, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 214, flow_bytes_toclient: 368, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2050651, event_type: dns, proto: UDP, dns_type: query, dns_id: 779, dns_rrname: idaas-production.us-east-...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 148, flow_bytes_toclient: 242, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2054290, event_type: dns, proto: UDP, dns_type: query, dns_id: 48812, dns_rrname: DC.Testbed1.ca, dns_rrt...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 174, flow_bytes_toclient: 206, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2051947, event_type: dns, proto: UDP, dns_type: query, dns_id: 32813, dns_rrname: ips-invite.iperceptions...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 174, flow_bytes_toclient: 286, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2084997, event_type: dns, proto: UDP, dns_type: query, dns_id: 59658, dns_rrname: 183.165.230.34.in-addr....
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 148, flow_bytes_toclient: 242, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2164507, event_type: dns, proto: UDP, dns_type: query, dns_id: 44972, dns_rrname: DC.Testbed1.ca, dns_rrt...
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio...