log stringlengths 195 2.49k | label int64 0 1 | class stringclasses 12
values | response stringclasses 12
values |
|---|---|---|---|
event_type: flow, proto: TCP, app_proto: krb5, flow_pkts_toserver: 8, flow_pkts_toclient: 8, flow_bytes_toserver: 946, flow_bytes_toclient: 894, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: Tru... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 148, flow_bytes_toclient: 180, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2732, event_type: dns, proto: UDP, dns_type: query, dns_id: 37338, dns_rrname: DC.Testbed1.ca, dns_rrtype... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: krb5, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 436, flow_bytes_toclient: 442, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 5062, event_type: krb5, proto: UDP, krb5_msg_type: KRB_ERROR, krb5_failed_request: KRB_AS_REQ, krb5_erro... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 170, flow_bytes_toclient: 226, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9501, event_type: dns, proto: UDP, dns_type: query, dns_id: 36793, dns_rrname: 3.10.168.192.in-addr.arpa,... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 148, flow_bytes_toclient: 180, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 10595, event_type: dns, proto: UDP, dns_type: query, dns_id: 26056, dns_rrname: DC.Testbed1.ca, dns_rrtyp... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 130, flow_bytes_toclient: 130, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 14243, event_type: dns, proto: UDP, dns_type: query, dns_id: 27070, dns_rrname: macpc, dns_rrtype: A, dns... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 172, flow_bytes_toclient: 272, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 14436, event_type: dns, proto: UDP, dns_type: query, dns_id: 29884, dns_rrname: _kerberos._tcp.TESTBED1.C... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 186, flow_bytes_toclient: 308, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 14835, event_type: dns, proto: UDP, dns_type: query, dns_id: 40178, dns_rrname: _kerberos-master._udp.TES... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 21, flow_pkts_toclient: 21, flow_bytes_toserver: 1986, flow_bytes_toclient: 7849, flow_age: 116, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 29, flow_pkts_toclient: 29, flow_bytes_toserver: 3491, flow_bytes_toclient: 21210, flow_age: 120, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ac... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 22, flow_pkts_toclient: 16, flow_bytes_toserver: 6350, flow_bytes_toclient: 8014, flow_age: 17, flow_state: established, flow_reason: timeout, tcp_tcp_flags: 1a, tcp_tcp_flags_ts: 1a, tcp_tcp_flags_tc: 1a, tcp_syn: True, tcp_psh: True, tcp_ack: True, tcp... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 172, flow_bytes_toclient: 272, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 25176, event_type: dns, proto: UDP, dns_type: query, dns_id: 1658, dns_rrname: _kerberos._tcp.TESTBED1.CA... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 97, flow_bytes_toclient: 160, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 25547, event_type: dns, proto: UDP, dns_type: query, dns_id: 6388, dns_rrname: 150.59.148.54.in-addr.arpa,... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 172, flow_bytes_toclient: 298, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 25545, event_type: dns, proto: UDP, dns_type: query, dns_id: 61783, dns_rrname: 150.59.148.54.in-addr.arp... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: ntp, flow_pkts_toserver: 49, flow_pkts_toclient: 49, flow_bytes_toserver: 4410, flow_bytes_toclient: 4410, flow_age: 4781, flow_state: established, flow_reason: timeout | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 172, flow_bytes_toclient: 272, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 40364, event_type: dns, proto: UDP, dns_type: query, dns_id: 61702, dns_rrname: _kerberos._udp.TESTBED1.C... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 148, flow_bytes_toclient: 180, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 43289, event_type: dns, proto: UDP, dns_type: query, dns_id: 17945, dns_rrname: DC.Testbed1.ca, dns_rrtyp... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 14, flow_pkts_toclient: 16, flow_bytes_toserver: 2022, flow_bytes_toclient: 10652, flow_age: 17, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 162, flow_bytes_toclient: 194, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 49579, event_type: dns, proto: UDP, dns_type: query, dns_id: 38272, dns_rrname: scontent.xx.fbcdn.net, dn... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 178, flow_bytes_toclient: 280, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 49387, event_type: dns, proto: UDP, dns_type: query, dns_id: 16191, dns_rrname: safebrowsing-cache.google... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 98, flow_bytes_toclient: 155, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 53207, event_type: dns, proto: UDP, dns_type: query, dns_id: 54066, dns_rrname: 131.66.163.152.in-addr.arp... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 178, flow_bytes_toclient: 280, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 52438, event_type: dns, proto: UDP, dns_type: query, dns_id: 24139, dns_rrname: safebrowsing-cache.google... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 152, flow_bytes_toclient: 264, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 53538, event_type: dns, proto: UDP, dns_type: query, dns_id: 28100, dns_rrname: adx.districtm.ca, dns_rrt... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 172, flow_bytes_toclient: 280, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 54644, event_type: dns, proto: UDP, dns_type: query, dns_id: 42692, dns_rrname: 27.33.132.192.in-addr.arp... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 158, flow_bytes_toclient: 190, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 55330, event_type: dns, proto: UDP, dns_type: query, dns_id: 13237, dns_rrname: pixel.sitescout.com, dns_... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 168, flow_bytes_toclient: 274, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 56641, event_type: dns, proto: UDP, dns_type: query, dns_id: 45660, dns_rrname: 62.222.0.52.in-addr.arpa,... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 160, flow_bytes_toclient: 264, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 62762, event_type: dns, proto: UDP, dns_type: query, dns_id: 62587, dns_rrname: fonts.googleapis.com, dns... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 44, flow_pkts_toclient: 52, flow_bytes_toserver: 4661, flow_bytes_toclient: 72699, flow_age: 116, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1f, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_ps... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 166, flow_bytes_toclient: 198, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 62792, event_type: dns, proto: UDP, dns_type: query, dns_id: 10916, dns_rrname: e11100.g.akamaiedge.net, ... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, flow_pkts_toserver: 5, flow_pkts_toclient: 3, flow_bytes_toserver: 338, flow_bytes_toclient: 214, flow_age: 6, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 13, tcp_tcp_flags_ts: 13, tcp_tcp_flags_tc: 13, tcp_syn: True, tcp_fin: True, tcp_ack: True, tcp_state: closed | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 250, flow_bytes_toclient: 414, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 68671, event_type: dns, proto: UDP, dns_type: query, dns_id: 16978, dns_rrname: privacycollector-producti... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 5, flow_bytes_toserver: 765, flow_bytes_toclient: 2603, flow_age: 1, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 13, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: Tr... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 93, flow_bytes_toclient: 240, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 70985, event_type: dns, proto: UDP, dns_type: query, dns_id: 11028, dns_rrname: cdn-us-east.velaro.com, dn... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, app_proto: krb5, flow_pkts_toserver: 8, flow_pkts_toclient: 8, flow_bytes_toserver: 932, flow_bytes_toclient: 850, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: Tru... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 170, flow_bytes_toclient: 202, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 84988, event_type: dns, proto: UDP, dns_type: query, dns_id: 44178, dns_rrname: e6913.dscx.akamaiedge.net... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 96, flow_bytes_toclient: 151, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 87503, event_type: dns, proto: UDP, dns_type: query, dns_id: 29659, dns_rrname: 28.37.192.54.in-addr.arpa,... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 164, flow_bytes_toclient: 196, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 88566, event_type: dns, proto: UDP, dns_type: query, dns_id: 19022, dns_rrname: e9690.b.akamaiedge.net, d... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 152, flow_bytes_toclient: 244, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 89751, event_type: dns, proto: UDP, dns_type: query, dns_id: 64762, dns_rrname: books.disney.com, dns_rrt... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 158, flow_bytes_toclient: 190, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 89813, event_type: dns, proto: UDP, dns_type: query, dns_id: 4049, dns_rrname: www.disneyonice.com, dns_r... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 184, flow_bytes_toclient: 240, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 90002, event_type: dns, proto: UDP, dns_type: query, dns_id: 7165, dns_rrname: pagead-googlehosted.l.goog... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 186, flow_bytes_toclient: 308, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 93901, event_type: dns, proto: UDP, dns_type: query, dns_id: 57463, dns_rrname: _kerberos-master._tcp.TES... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 112, flow_bytes_toclient: 176, flow_age: 1, flow_state: established, flow_reason: timeout ; pcap_cnt: 94725, event_type: dns, proto: UDP, dns_type: query, dns_id: 1702, dns_rrname: dmd.metaservices.microsoft... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 96, flow_bytes_toclient: 175, flow_age: 1, flow_state: established, flow_reason: timeout ; pcap_cnt: 94902, event_type: dns, proto: UDP, dns_type: query, dns_id: 45142, dns_rrname: 27.145.80.40.in-addr.arpa,... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 4, flow_pkts_toclient: 2, flow_bytes_toserver: 348, flow_bytes_toclient: 310, flow_age: 1, flow_state: established, flow_reason: timeout ; pcap_cnt: 95086, event_type: dns, proto: UDP, dns_type: query, dns_id: 51147, dns_rrname: 189.58.170.134.in-addr.ar... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, flow_pkts_toserver: 3, flow_pkts_toclient: 2, flow_bytes_toserver: 186, flow_bytes_toclient: 120, flow_age: 45, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 16, tcp_tcp_flags_ts: 12, tcp_tcp_flags_tc: 16, tcp_syn: True, tcp_rst: True, tcp_ack: True, tcp_state: closed | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 90, flow_bytes_toclient: 154, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 104496, event_type: dns, proto: UDP, dns_type: query, dns_id: 9321, dns_rrname: support.mozilla.org, dns_r... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 238, flow_bytes_toclient: 394, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 114122, event_type: dns, proto: UDP, dns_type: query, dns_id: 1193, dns_rrname: normandy-cdn-elb-prod-787... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 8, flow_pkts_toclient: 8, flow_bytes_toserver: 1069, flow_bytes_toclient: 3299, flow_age: 8, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: T... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 164, flow_bytes_toclient: 282, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 119666, event_type: dns, proto: UDP, dns_type: query, dns_id: 61069, dns_rrname: img2.tmon.kr.cdngc.net, ... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 85, flow_bytes_toclient: 113, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 123290, event_type: dns, proto: UDP, dns_type: query, dns_id: 28502, dns_rrname: www.google.com, dns_rrtyp... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 83, flow_bytes_toclient: 175, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 199055, event_type: dns, proto: UDP, dns_type: query, dns_id: 25222, dns_rrname: bat.bing.com, dns_rrtype:... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 172, flow_bytes_toclient: 260, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 349665, event_type: dns, proto: UDP, dns_type: query, dns_id: 44468, dns_rrname: marketing.citrixonline.c... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 168, flow_bytes_toclient: 276, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 359055, event_type: dns, proto: UDP, dns_type: query, dns_id: 32627, dns_rrname: www.googleadservices.com... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 168, flow_bytes_toclient: 288, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 359333, event_type: dns, proto: UDP, dns_type: query, dns_id: 63429, dns_rrname: www.google-analytics.com... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 19, flow_pkts_toclient: 18, flow_bytes_toserver: 2218, flow_bytes_toclient: 9378, flow_age: 66, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack:... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 91, flow_bytes_toclient: 219, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 364445, event_type: dns, proto: UDP, dns_type: query, dns_id: 44875, dns_rrname: ib.anycast.adnxs.com, dns... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 102, flow_pkts_toclient: 57, flow_bytes_toserver: 27174, flow_bytes_toclient: 13432, flow_age: 894, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 146, flow_bytes_toclient: 258, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 450624, event_type: dns, proto: UDP, dns_type: query, dns_id: 56331, dns_rrname: t.a3cloud.net, dns_rrtyp... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 104, flow_bytes_toclient: 231, flow_age: 1, flow_state: established, flow_reason: timeout ; pcap_cnt: 451977, event_type: dns, proto: UDP, dns_type: query, dns_id: 24719, dns_rrname: content-signature.cdn.mo... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 174, flow_bytes_toclient: 286, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 492079, event_type: dns, proto: UDP, dns_type: query, dns_id: 44668, dns_rrname: 233.178.235.54.in-addr.a... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 85, flow_bytes_toclient: 101, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 495202, event_type: dns, proto: UDP, dns_type: query, dns_id: 60237, dns_rrname: rp.gwallet.com, dns_rrtyp... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 10, flow_pkts_toclient: 9, flow_bytes_toserver: 931, flow_bytes_toclient: 6445, flow_age: 6, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1f, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: Tr... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 148, flow_bytes_toclient: 180, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 496305, event_type: dns, proto: UDP, dns_type: query, dns_id: 59832, dns_rrname: rs.gwallet.com, dns_rrty... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 93, flow_bytes_toclient: 109, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 496200, event_type: dns, proto: UDP, dns_type: query, dns_id: 28842, dns_rrname: e6791.b.akamaiedge.net, d... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 146, flow_bytes_toclient: 242, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 534554, event_type: dns, proto: UDP, dns_type: query, dns_id: 62572, dns_rrname: cent.spots.im, dns_rrtyp... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 11, flow_pkts_toclient: 9, flow_bytes_toserver: 1027, flow_bytes_toclient: 778, flow_age: 6, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1f, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: Tr... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 21, flow_pkts_toclient: 18, flow_bytes_toserver: 4229, flow_bytes_toclient: 2387, flow_age: 116, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1f, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 182, flow_bytes_toclient: 366, flow_age: 145, flow_state: established, flow_reason: timeout ; pcap_cnt: 685746, event_type: dns, proto: UDP, dns_type: query, dns_id: 32277, dns_rrname: p.rfihub.com, dns_rrty... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 158, flow_bytes_toclient: 190, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 853749, event_type: dns, proto: UDP, dns_type: query, dns_id: 19221, dns_rrname: redirector.gvt1.com, dns... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 172, flow_bytes_toclient: 312, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1035074, event_type: dns, proto: UDP, dns_type: query, dns_id: 7050, dns_rrname: 238.6.217.172.in-addr.ar... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 150, flow_bytes_toclient: 286, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1131279, event_type: dns, proto: UDP, dns_type: query, dns_id: 9329, dns_rrname: ana.112.2o7.net, dns_rrt... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 5, flow_bytes_toserver: 795, flow_bytes_toclient: 3082, flow_age: 11, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 13, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: T... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 98, flow_bytes_toclient: 164, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1157692, event_type: dns, proto: UDP, dns_type: query, dns_id: 35136, dns_rrname: fb-ret-list-lb03.appier.... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 16, flow_pkts_toclient: 12, flow_bytes_toserver: 1549, flow_bytes_toclient: 4996, flow_age: 1, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1f, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: ... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 152, flow_bytes_toclient: 244, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1167634, event_type: dns, proto: UDP, dns_type: query, dns_id: 34352, dns_rrname: k.streamrail.com, dns_r... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 9, flow_pkts_toclient: 8, flow_bytes_toserver: 1724, flow_bytes_toclient: 1213, flow_age: 1, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1e, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: Tr... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, app_proto: krb5, flow_pkts_toserver: 8, flow_pkts_toclient: 10, flow_bytes_toserver: 3452, flow_bytes_toclient: 3504, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 13, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: ... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 21, flow_pkts_toclient: 19, flow_bytes_toserver: 2446, flow_bytes_toclient: 1856, flow_age: 116, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 122, flow_bytes_toclient: 200, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1287272, event_type: dns, proto: UDP, dns_type: query, dns_id: 15320, dns_rrname: dcs-edge-usw2-620097651... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 204, flow_bytes_toclient: 340, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1300856, event_type: dns, proto: UDP, dns_type: query, dns_id: 44980, dns_rrname: ec2-54-236-254-146.comp... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 178, flow_bytes_toclient: 352, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1319662, event_type: dns, proto: UDP, dns_type: query, dns_id: 1858, dns_rrname: d2mb2l2ls1y7ht.cloudfron... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 98, flow_bytes_toclient: 114, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1320705, event_type: dns, proto: UDP, dns_type: query, dns_id: 19538, dns_rrname: star-mini.c10r.facebook.... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 154, flow_bytes_toclient: 210, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1322681, event_type: dns, proto: UDP, dns_type: query, dns_id: 8836, dns_rrname: ocsp.comodoca.com, dns_r... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 162, flow_bytes_toclient: 194, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1583722, event_type: dns, proto: UDP, dns_type: query, dns_id: 12806, dns_rrname: press.gettyimages.com, ... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 17, flow_pkts_toclient: 15, flow_bytes_toserver: 1783, flow_bytes_toclient: 2970, flow_age: 116, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 13, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ac... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 146, flow_bytes_toclient: 260, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 1735499, event_type: dns, proto: UDP, dns_type: query, dns_id: 28831, dns_rrname: carbonads.net, dns_rrty... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 15, flow_pkts_toclient: 13, flow_bytes_toserver: 2171, flow_bytes_toclient: 5328, flow_age: 32, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack:... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 18, flow_pkts_toclient: 21, flow_bytes_toserver: 1763, flow_bytes_toclient: 17130, flow_age: 305, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1f, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_ps... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 168, flow_bytes_toclient: 256, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2020271, event_type: dns, proto: UDP, dns_type: query, dns_id: 47895, dns_rrname: 12.80.13.31.in-addr.arp... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 3, flow_pkts_toclient: 3, flow_bytes_toserver: 297, flow_bytes_toclient: 412, flow_age: 21, flow_state: established, flow_reason: timeout ; pcap_cnt: 2028185, event_type: dns, proto: UDP, dns_type: query, dns_id: 65497, dns_rrname: pagead-googlehosted.l.... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 154, flow_bytes_toclient: 242, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2045174, event_type: dns, proto: UDP, dns_type: query, dns_id: 22693, dns_rrname: widget.criteo.com, dns_... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 154, flow_pkts_toclient: 221, flow_bytes_toserver: 26840, flow_bytes_toclient: 114683, flow_age: 680, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tc... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 3, flow_pkts_toclient: 4, flow_bytes_toserver: 1553, flow_bytes_toclient: 1606, flow_age: 1, flow_state: established, flow_reason: timeout | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 18, flow_pkts_toclient: 15, flow_bytes_toserver: 4656, flow_bytes_toclient: 7636, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: ... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 24, flow_pkts_toclient: 23, flow_bytes_toserver: 2718, flow_bytes_toclient: 5570, flow_age: 117, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 214, flow_bytes_toclient: 368, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2050651, event_type: dns, proto: UDP, dns_type: query, dns_id: 779, dns_rrname: idaas-production.us-east-... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 148, flow_bytes_toclient: 242, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2054290, event_type: dns, proto: UDP, dns_type: query, dns_id: 48812, dns_rrname: DC.Testbed1.ca, dns_rrt... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 174, flow_bytes_toclient: 206, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2051947, event_type: dns, proto: UDP, dns_type: query, dns_id: 32813, dns_rrname: ips-invite.iperceptions... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 174, flow_bytes_toclient: 286, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2084997, event_type: dns, proto: UDP, dns_type: query, dns_id: 59658, dns_rrname: 183.165.230.34.in-addr.... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 148, flow_bytes_toclient: 242, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2164507, event_type: dns, proto: UDP, dns_type: query, dns_id: 44972, dns_rrname: DC.Testbed1.ca, dns_rrt... | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicio... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.