The full dataset viewer is not available (click to read why). Only showing a preview of the rows.
Error code: UnexpectedError
Need help to make the dataset viewer work? Make sure to review how to configure the dataset viewer, and open a discussion for direct support.
session_id string | logs list | metadata dict | parsed_logs list |
|---|---|---|---|
attacker_0_20220113_1320 | [
"{\"timestamp\":\"1642080091884\",\"no_\":\"58\",\"time\":\"46.157948\",\"source\":\"<IP:a065a3a9>\",\"destination\":\"<IP:16995b9b>\",\"protocol\":\"DNS\",\"length\":\"309\",\"info\":\"Standard query 0x06d4 A 3x6-.2-.DASkBwIEhPg\\/zTW0dTD*Y*9EfI9MHx1AyLdwlFudk0SpbhYbyN5fQiwKbMdk-.efWXRababxXzj2zigm*IXkCiU5E5pvsTSc... | {
"duration_seconds": 179.312,
"host": "attacker_0",
"host_id": 0,
"hour": 13,
"is_weekend": false,
"log_types": [
"dnsteal"
],
"n_logs": 6,
"parsing_stats": {
"detected_types": [
"json"
],
"parse_rate": 1,
"successfully_parsed": 6,
"total_logs": 6
}
} | [
{
"log_format": "json",
"parsed": "True",
"raw": "{\"timestamp\":\"1642080091884\",\"no_\":\"58\",\"time\":\"46.157948\",\"source\":\"<IP:a065a3a9>\",\"destination\":\"<IP:16995b9b>\",\"protocol\":\"DNS\",\"length\":\"309\",\"info\":\"Standard query 0x06d4 A 3x6-.2-.DASkBwIEhPg\\/zTW0dTD*Y*9EfI9MHx1AyLd... |
attacker_0_20220113_1325 | [
"{\"timestamp\":\"1642080317271\",\"no_\":\"115\",\"time\":\"271.545365\",\"source\":\"<IP:a065a3a9>\",\"destination\":\"<IP:16995b9b>\",\"protocol\":\"DNS\",\"length\":\"310\",\"info\":\"Standard query 0x30ec A 3x6-.17-.pfNhh2XdGPzc9zT08GJH9DXvsS7H9KbplvVbuRlZPJdEggzpL7xJmrsPKecJ-.ubC6MW9in72oHE7hxwZArdpXA2UeCe\\/... | {
"duration_seconds": 269.487,
"host": "attacker_0",
"host_id": 0,
"hour": 13,
"is_weekend": false,
"log_types": [
"dnsteal"
],
"n_logs": 8,
"parsing_stats": {
"detected_types": [
"json"
],
"parse_rate": 1,
"successfully_parsed": 8,
"total_logs": 8
}
} | [
{
"log_format": "json",
"parsed": "True",
"raw": "{\"timestamp\":\"1642080317271\",\"no_\":\"115\",\"time\":\"271.545365\",\"source\":\"<IP:a065a3a9>\",\"destination\":\"<IP:16995b9b>\",\"protocol\":\"DNS\",\"length\":\"310\",\"info\":\"Standard query 0x30ec A 3x6-.17-.pfNhh2XdGPzc9zT08GJH9DXvsS7H9Kbplv... |
attacker_0_20220113_1330 | [
"{\"timestamp\":\"1642080632843\",\"no_\":\"192\",\"time\":\"587.117218\",\"source\":\"<IP:a065a3a9>\",\"destination\":\"<IP:16995b9b>\",\"protocol\":\"DNS\",\"length\":\"310\",\"info\":\"Standard query 0xcc19 A 3x6-.37-.K1i2ObYdTNCSqcvtveOElTqXQsSwAvI0r5o3vh2bZPP4AoxoyIDh91Rsh3lt-.m8aGbEFwaAFY3h3ma4vuablMjvnQXD0Wv... | {
"duration_seconds": 236.414,
"host": "attacker_0",
"host_id": 0,
"hour": 13,
"is_weekend": false,
"log_types": [
"dnsteal"
],
"n_logs": 7,
"parsing_stats": {
"detected_types": [
"json"
],
"parse_rate": 1,
"successfully_parsed": 7,
"total_logs": 7
}
} | [
{
"log_format": "json",
"parsed": "True",
"raw": "{\"timestamp\":\"1642080632843\",\"no_\":\"192\",\"time\":\"587.117218\",\"source\":\"<IP:a065a3a9>\",\"destination\":\"<IP:16995b9b>\",\"protocol\":\"DNS\",\"length\":\"310\",\"info\":\"Standard query 0xcc19 A 3x6-.37-.K1i2ObYdTNCSqcvtveOElTqXQsSwAvI0r5... |
attacker_0_20220113_1335 | [
"{\"timestamp\":\"1642080901312\",\"no_\":\"249\",\"time\":\"855.586517\",\"source\":\"<IP:16995b9b>\",\"destination\":\"<IP:a065a3a9>\",\"protocol\":\"DNS\",\"length\":\"328\",\"info\":\"Standard query response 0x66b7 A 3x6-.54-.soPkf5wuqgwA9vm1\\/S06ed30*kbUrrh19M6tDdKcs6bG9GunU*i2fn2SIyCN-.IYAXrAU5YJ16k5EPETqMXZ... | {
"duration_seconds": 282.504,
"host": "attacker_0",
"host_id": 0,
"hour": 13,
"is_weekend": false,
"log_types": [
"dnsteal"
],
"n_logs": 8,
"parsing_stats": {
"detected_types": [
"json"
],
"parse_rate": 1,
"successfully_parsed": 8,
"total_logs": 8
}
} | [
{
"log_format": "json",
"parsed": "True",
"raw": "{\"timestamp\":\"1642080901312\",\"no_\":\"249\",\"time\":\"855.586517\",\"source\":\"<IP:16995b9b>\",\"destination\":\"<IP:a065a3a9>\",\"protocol\":\"DNS\",\"length\":\"328\",\"info\":\"Standard query response 0x66b7 A 3x6-.54-.soPkf5wuqgwA9vm1\\/S06ed3... |
attacker_0_20220113_1340 | [
"{\"timestamp\":\"1642081210872\",\"no_\":\"326\",\"time\":\"1165.146208\",\"source\":\"<IP:16995b9b>\",\"destination\":\"<IP:a065a3a9>\",\"protocol\":\"DNS\",\"length\":\"328\",\"info\":\"Standard query response 0x223d A 3x6-.74-.I5tnuVrVTnFZHC2\\/b5kc*LRjQ5E\\/Fz5dp*VOoj4*s3C2ua*YXAQeJjpuYi*5-.lJMUxkwWP5IHrt92cZa... | {
"duration_seconds": 278.502,
"host": "attacker_0",
"host_id": 0,
"hour": 13,
"is_weekend": false,
"log_types": [
"dnsteal"
],
"n_logs": 8,
"parsing_stats": {
"detected_types": [
"json"
],
"parse_rate": 1,
"successfully_parsed": 8,
"total_logs": 8
}
} | [
{
"log_format": "json",
"parsed": "True",
"raw": "{\"timestamp\":\"1642081210872\",\"no_\":\"326\",\"time\":\"1165.146208\",\"source\":\"<IP:16995b9b>\",\"destination\":\"<IP:a065a3a9>\",\"protocol\":\"DNS\",\"length\":\"328\",\"info\":\"Standard query response 0x223d A 3x6-.74-.I5tnuVrVTnFZHC2\\/b5kc*L... |
attacker_0_20220113_1345 | [
"{\"timestamp\":\"1642081521431\",\"no_\":\"399\",\"time\":\"1475.704894\",\"source\":\"<IP:16995b9b>\",\"destination\":\"<IP:a065a3a9>\",\"protocol\":\"DNS\",\"length\":\"328\",\"info\":\"Standard query response 0x1e47 A 3x6-.94-.kckxQ3G1yW28JRaxBB81Gju7BCrQbAinmdylk7VAq9hRDwFvn*2wAMSTt\\/Iv-.MRplX6TlZXK9Czo5r5t7s... | {
"duration_seconds": 262.493,
"host": "attacker_0",
"host_id": 0,
"hour": 13,
"is_weekend": false,
"log_types": [
"dnsteal"
],
"n_logs": 8,
"parsing_stats": {
"detected_types": [
"json"
],
"parse_rate": 1,
"successfully_parsed": 8,
"total_logs": 8
}
} | [
{
"log_format": "json",
"parsed": "True",
"raw": "{\"timestamp\":\"1642081521431\",\"no_\":\"399\",\"time\":\"1475.704894\",\"source\":\"<IP:16995b9b>\",\"destination\":\"<IP:a065a3a9>\",\"protocol\":\"DNS\",\"length\":\"328\",\"info\":\"Standard query response 0x1e47 A 3x6-.94-.kckxQ3G1yW28JRaxBB81Gju7... |
attacker_0_20220113_1350 | ["{\"timestamp\":\"1642081814980\",\"no_\":\"469\",\"time\":\"1769.254486\",\"source\":\"<IP:16995b9(...TRUNCATED) | {"duration_seconds":284.48,"host":"attacker_0","host_id":0,"hour":13,"is_weekend":false,"log_types":(...TRUNCATED) | [{"log_format":"json","parsed":"True","raw":"{\"timestamp\":\"1642081814980\",\"no_\":\"469\",\"time(...TRUNCATED) |
attacker_0_20220113_1355 | ["{\"timestamp\":\"1642082128515\",\"no_\":\"563\",\"time\":\"2082.789286\",\"source\":\"<IP:16995b9(...TRUNCATED) | {"duration_seconds":237.4,"host":"attacker_0","host_id":0,"hour":13,"is_weekend":false,"log_types":[(...TRUNCATED) | [{"log_format":"json","parsed":"True","raw":"{\"timestamp\":\"1642082128515\",\"no_\":\"563\",\"time(...TRUNCATED) |
attacker_0_20220113_1400 | ["{\"timestamp\":\"1642082412004\",\"no_\":\"642\",\"time\":\"2366.277551\",\"source\":\"<IP:a065a3a(...TRUNCATED) | {"duration_seconds":280.869,"host":"attacker_0","host_id":0,"hour":14,"is_weekend":false,"log_types"(...TRUNCATED) | [{"log_format":"json","parsed":"True","raw":"{\"timestamp\":\"1642082412004\",\"no_\":\"642\",\"time(...TRUNCATED) |
attacker_0_20220113_1405 | ["{\"timestamp\":\"1642082702529\",\"no_\":\"10911\",\"time\":\"2656.803484\",\"source\":\"<IP:a065a(...TRUNCATED) | {"duration_seconds":261.497,"host":"attacker_0","host_id":0,"hour":14,"is_weekend":false,"log_types"(...TRUNCATED) | [{"log_format":"json","parsed":"True","raw":"{\"timestamp\":\"1642082702529\",\"no_\":\"10911\",\"ti(...TRUNCATED) |
YAML Metadata Warning: empty or missing yaml metadata in repo card
Check out the documentation for more information.
LogAtlas-Foundation-Sessions 🦉
LogAtlas-Foundation-Sessions is a heterogeneous log session corpus designed for pretraining and adapting models to understand diverse operational behaviors across systems, networks, and applications. Each example is a time-bounded session of logs enriched with structured metadata, making it ideal as a foundation layer for downstream security and observability tasks.
Mascot
The LogAtlas-Foundation-Sessions mascot is a wise cyber cartographer owl perched on a floating holographic map made of log lines and timestamps. Its feathers resemble strips of parsed logs, and orbiting around it are capsules representing multi-source sessions and JSON metadata, symbolizing deep, contextual understanding of heterogeneous log streams over time.
Dataset Overview
- Goal: Pretrain or adapt models for general log understanding, contextual embedding of sessions, and robust representation learning across varied log types.
- Structure: Each example is a
session_idwithlogs, richmetadata(duration, host, log types, parsing stats), andparsed_logswith both raw and structured views. - Use cases:
- Pretraining log-aware transformers or LLMs
- Learning session-level representations for anomaly detection, clustering, and retrieval
- Serving as a foundation model corpus for downstream cybersecurity and observability tasks
- Downloads last month
- 13
