log
stringlengths 195
2.49k
| label
int64 0
1
| class
stringclasses 12
values | response
stringclasses 12
values |
|---|---|---|---|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 97, flow_bytes_toclient: 152, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 6431689, event_type: dns, proto: UDP, dns_type: query, dns_id: 28802, dns_rrname: 222.49.205.52.in-addr.arpa, dns_rrtype: PTR, dns_tx_id: 0 ; pcap_cnt: 6431699, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 28802, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: 222.49.205.52.in-addr.arpa, dns_rrtype: PTR, dns_rcode: NOERROR, dns_answers_0_rrname: 222.49.205.52.in-addr.arpa, dns_answers_0_rrtype: PTR, dns_answers_0_ttl: 300, dns_answers_0_rdata: ec2-52-205-49-222.compute-1.amazonaws.com, dns_grouped_PTR_0: ec2-52-205-49-222.compute-1.amazonaws.com
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 140, flow_bytes_toclient: 204, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 6432475, event_type: dns, proto: UDP, dns_type: query, dns_id: 31338, dns_rrname: cdn.vgc.no, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 6432476, event_type: dns, proto: UDP, dns_type: query, dns_id: 31338, dns_rrname: cdn.vgc.no, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 6432551, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 31338, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: cdn.vgc.no, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: cdn.vgc.no, dns_answers_0_rrtype: A, dns_answers_0_ttl: 600, dns_answers_0_rdata: 195.88.54.95, dns_answers_1_rrname: cdn.vgc.no, dns_answers_1_rrtype: A, dns_answers_1_ttl: 600, dns_answers_1_rdata: 195.88.55.95, dns_grouped_A_0: 195.88.54.95, dns_grouped_A_1: 195.88.55.95 ; pcap_cnt: 6432552, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 31338, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: cdn.vgc.no, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: cdn.vgc.no, dns_answers_0_rrtype: A, dns_answers_0_ttl: 600, dns_answers_0_rdata: 195.88.54.95, dns_answers_1_rrname: cdn.vgc.no, dns_answers_1_rrtype: A, dns_answers_1_ttl: 600, dns_answers_1_rdata: 195.88.55.95, dns_grouped_A_0: 195.88.54.95, dns_grouped_A_1: 195.88.55.95
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 134, flow_bytes_toclient: 166, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 6433853, event_type: dns, proto: UDP, dns_type: query, dns_id: 18796, dns_rrname: godt.no, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 6433854, event_type: dns, proto: UDP, dns_type: query, dns_id: 18796, dns_rrname: godt.no, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 6433855, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 18796, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: godt.no, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: godt.no, dns_answers_0_rrtype: A, dns_answers_0_ttl: 600, dns_answers_0_rdata: 195.88.54.96, dns_grouped_A_0: 195.88.54.96 ; pcap_cnt: 6433856, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 18796, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: godt.no, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: godt.no, dns_answers_0_rrtype: A, dns_answers_0_ttl: 600, dns_answers_0_rdata: 195.88.54.96, dns_grouped_A_0: 195.88.54.96
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 5, flow_pkts_toclient: 5, flow_bytes_toserver: 2535, flow_bytes_toclient: 1932, flow_age: 0, flow_state: established, flow_reason: timeout
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 8, flow_pkts_toclient: 8, flow_bytes_toserver: 2070, flow_bytes_toclient: 900, flow_age: 3, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6436526, event_type: tls, proto: TCP, tls_session_resumed: True, tls_sni: a.algovid.com, tls_version: TLS 1.2
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 9, flow_pkts_toclient: 6, flow_bytes_toserver: 1189, flow_bytes_toclient: 595, flow_age: 5, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1f, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6439728, event_type: tls, proto: TCP, tls_session_resumed: True, tls_sni: bid.contextweb.com, tls_version: TLS 1.2
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 99, flow_bytes_toclient: 115, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 6441290, event_type: dns, proto: UDP, dns_type: query, dns_id: 35504, dns_rrname: prod.appnexus.map.fastly.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 6441337, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 35504, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: prod.appnexus.map.fastly.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: prod.appnexus.map.fastly.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 1, dns_answers_0_rdata: 151.101.21.108, dns_grouped_A_0: 151.101.21.108
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 18, flow_pkts_toclient: 16, flow_bytes_toserver: 1632, flow_bytes_toclient: 3566, flow_age: 116, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6446318, event_type: fileinfo, proto: TCP, http_hostname: ocsp.entrust.net, http_url: /, http_http_user_agent: Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:31.0) Gecko/20100101 Firefox/31.0, http_http_content_type: application/ocsp-response, http_http_method: POST, http_protocol: HTTP/1.1, http_status: 200, http_length: 1066, app_proto: http, fileinfo_filename: /, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 83, fileinfo_tx_id: 0 ; pcap_cnt: 6446320, event_type: http, proto: TCP, tx_id: 0, http_hostname: ocsp.entrust.net, http_url: /, http_http_user_agent: Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:31.0) Gecko/20100101 Firefox/31.0, http_http_content_type: application/ocsp-response, http_http_method: POST, http_protocol: HTTP/1.1, http_status: 200, http_length: 2120 ; pcap_cnt: 6449099, event_type: fileinfo, proto: TCP, http_hostname: ocsp.entrust.net, http_url: /, http_http_user_agent: Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:31.0) Gecko/20100101 Firefox/31.0, http_http_content_type: application/ocsp-response, http_http_method: POST, http_protocol: HTTP/1.1, http_status: 200, http_length: 2120, app_proto: http, fileinfo_filename: /, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 2120, fileinfo_tx_id: 0
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 156, flow_bytes_toclient: 188, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 6446817, event_type: dns, proto: UDP, dns_type: query, dns_id: 42220, dns_rrname: bourse.lefigaro.fr, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 6446818, event_type: dns, proto: UDP, dns_type: query, dns_id: 42220, dns_rrname: bourse.lefigaro.fr, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 6446831, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 42220, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: bourse.lefigaro.fr, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: bourse.lefigaro.fr, dns_answers_0_rrtype: A, dns_answers_0_ttl: 62, dns_answers_0_rdata: 78.109.86.56, dns_grouped_A_0: 78.109.86.56 ; pcap_cnt: 6446832, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 42220, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: bourse.lefigaro.fr, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: bourse.lefigaro.fr, dns_answers_0_rrtype: A, dns_answers_0_ttl: 62, dns_answers_0_rdata: 78.109.86.56, dns_grouped_A_0: 78.109.86.56
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 8, flow_pkts_toclient: 7, flow_bytes_toserver: 1075, flow_bytes_toclient: 572, flow_age: 6, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6448762, event_type: tls, proto: TCP, tls_session_resumed: True, tls_sni: cdn.cdnvideofiles.com, tls_version: TLS 1.2
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 7, flow_pkts_toclient: 7, flow_bytes_toserver: 937, flow_bytes_toclient: 996, flow_age: 30, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6448178, event_type: http, proto: TCP, tx_id: 0, http_hostname: tmgr.ccmbg.com, http_url: /93497a58-c248-4474-9d33-37434fb4f941/tap, http_http_user_agent: Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:31.0) Gecko/20100101 Firefox/31.0, http_http_content_type: image/png, http_http_refer: http://dpm.zebestof.com/sync-all.html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 95 ; pcap_cnt: 6449409, event_type: fileinfo, proto: TCP, http_hostname: tmgr.ccmbg.com, http_url: /93497a58-c248-4474-9d33-37434fb4f941/tap, http_http_user_agent: Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:31.0) Gecko/20100101 Firefox/31.0, http_http_content_type: image/png, http_http_refer: http://dpm.zebestof.com/sync-all.html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 95, app_proto: http, fileinfo_filename: /93497a58-c248-4474-9d33-37434fb4f941/tap, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 95, fileinfo_tx_id: 0
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 10, flow_pkts_toclient: 13, flow_bytes_toserver: 1058, flow_bytes_toclient: 16015, flow_age: 55, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 13, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6472215, event_type: http, proto: TCP, tx_id: 0, http_hostname: mps.nbcnews.com, http_url: /request/component/todayshow?name=adobe-audience-manager.js, http_http_user_agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_5_8) AppleWebKit/534.50.2 (KHTML, like Gecko) Version/5.0.6 Safari/533.22.3, http_http_content_type: application/x-javascript, http_http_refer: http://www.today.com/?_r=1, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 12657 ; event_type: fileinfo, proto: TCP, http_hostname: mps.nbcnews.com, http_url: /request/component/todayshow?name=adobe-audience-manager.js, http_http_user_agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_5_8) AppleWebKit/534.50.2 (KHTML, like Gecko) Version/5.0.6 Safari/533.22.3, http_http_content_type: application/x-javascript, http_http_refer: http://www.today.com/?_r=1, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 12657, app_proto: http, fileinfo_filename: /request/component/todayshow, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 36693, fileinfo_tx_id: 0
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 7, flow_pkts_toclient: 5, flow_bytes_toserver: 959, flow_bytes_toclient: 634, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6454893, event_type: http, proto: TCP, tx_id: 0, http_hostname: www.vilynx.com, http_url: /get_hashes.php, http_http_user_agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_5_8) AppleWebKit/534.50.2 (KHTML, like Gecko) Version/5.0.6 Safari/533.22.3, http_http_content_type: text/html, http_http_refer: http://www.today.com/?_r=1, http_http_method: OPTIONS, http_protocol: HTTP/1.1, http_status: 200, http_length: 40
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 6, flow_pkts_toclient: 4, flow_bytes_toserver: 767, flow_bytes_toclient: 416, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6455220, event_type: http, proto: TCP, tx_id: 0, http_hostname: pagead2.googlesyndication.com, http_url: /pagead/show_ads.js, http_http_user_agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_5_8) AppleWebKit/534.50.2 (KHTML, like Gecko) Version/5.0.6 Safari/533.22.3, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 304, http_length: 0
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 16, flow_pkts_toclient: 15, flow_bytes_toserver: 1711, flow_bytes_toclient: 6636, flow_age: 61, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6467993, event_type: tls, proto: TCP, tls_subject: OU=Domain Control Validated, CN=*.krxd.net, tls_issuerdn: C=US, ST=Arizona, L=Scottsdale, O=GoDaddy.com, Inc., OU=http://certs.godaddy.com/repository/, CN=Go Daddy Secure Certificate Authority - G2, tls_serial: 00:B3:51:DB:59:AD:BA:40:F2, tls_fingerprint: 71:60:a7:e1:43:b5:f5:33:f2:a2:43:76:f2:e0:43:18:38:d4:a5:5a, tls_sni: usermatch.krxd.net, tls_version: TLS 1.2, tls_notbefore: 2015-06-12T19:52:39, tls_notafter: 2017-07-11T19:15:36
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 16, flow_pkts_toclient: 15, flow_bytes_toserver: 1782, flow_bytes_toclient: 6331, flow_age: 61, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6468177, event_type: tls, proto: TCP, tls_subject: CN=*.gumgum.com, tls_issuerdn: C=US, O=Amazon, OU=Server CA 1B, CN=Amazon, tls_serial: 07:AD:81:E8:2B:4C:FA:38:3D:6D:86:82:EA:03:73:87, tls_fingerprint: a4:a1:a1:d1:86:97:94:c8:8b:a6:25:ac:bc:85:3a:ae:ae:5a:89:2b, tls_sni: rtb.gumgum.com, tls_version: TLS 1.2, tls_notbefore: 2017-02-13T00:00:00, tls_notafter: 2018-03-13T12:00:00
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 170, flow_bytes_toclient: 288, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 6469631, event_type: dns, proto: UDP, dns_type: query, dns_id: 8025, dns_rrname: tpc.googlesyndication.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 6469632, event_type: dns, proto: UDP, dns_type: query, dns_id: 8025, dns_rrname: tpc.googlesyndication.com, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 6469637, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 8025, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: tpc.googlesyndication.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: tpc.googlesyndication.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 36785, dns_answers_0_rdata: pagead-googlehosted.l.google.com, dns_answers_1_rrname: pagead-googlehosted.l.google.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 100, dns_answers_1_rdata: 172.217.9.225, dns_grouped_A_0: 172.217.9.225, dns_grouped_CNAME_0: pagead-googlehosted.l.google.com ; pcap_cnt: 6469638, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 8025, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: tpc.googlesyndication.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: tpc.googlesyndication.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 36785, dns_answers_0_rdata: pagead-googlehosted.l.google.com, dns_answers_1_rrname: pagead-googlehosted.l.google.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 100, dns_answers_1_rdata: 172.217.9.225, dns_grouped_CNAME_0: pagead-googlehosted.l.google.com, dns_grouped_A_0: 172.217.9.225
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 98, flow_bytes_toclient: 134, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 6480002, event_type: dns, proto: UDP, dns_type: query, dns_id: 18093, dns_rrname: 136.57.243.136.in-addr.arpa, dns_rrtype: PTR, dns_tx_id: 0 ; pcap_cnt: 6480385, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 18093, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: 136.57.243.136.in-addr.arpa, dns_rrtype: PTR, dns_rcode: NOERROR, dns_answers_0_rrname: 136.57.243.136.in-addr.arpa, dns_answers_0_rrtype: PTR, dns_answers_0_ttl: 86400, dns_answers_0_rdata: cache-01.pushwoosh.com, dns_grouped_PTR_0: cache-01.pushwoosh.com
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 16, flow_pkts_toclient: 11, flow_bytes_toserver: 1925, flow_bytes_toclient: 4420, flow_age: 1, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1f, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6479950, event_type: tls, proto: TCP, tls_subject: CN=*.adsrvr.org, O=The Trade Desk Inc, L=Ventura, ST=California, C=US, tls_issuerdn: C=US, ST=Illinois, L=Chicago, O=Trustwave Holdings, Inc., CN=Trustwave Organization Validation SHA256 CA, Level 1, [email protected], tls_serial: 06:AB:33:CD:45:44:90:4A:A7:1E:53:44:FC:EB:31:8F:16:BB:F3, tls_fingerprint: b8:5f:98:92:48:ca:9d:f9:92:1c:ce:34:6d:6a:b1:aa:9d:92:b4:ce, tls_sni: match.adsrvr.org, tls_version: TLSv1, tls_notbefore: 2017-02-15T12:23:13, tls_notafter: 2019-04-19T18:23:13
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 9, flow_pkts_toclient: 6, flow_bytes_toserver: 879, flow_bytes_toclient: 3667, flow_age: 5, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6485188, event_type: tls, proto: TCP, tls_session_resumed: True, tls_sni: kraken.rambler.ru, tls_version: TLS 1.2
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 12, flow_pkts_toclient: 11, flow_bytes_toserver: 1686, flow_bytes_toclient: 6940, flow_age: 16, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6484856, event_type: tls, proto: TCP, tls_session_resumed: True, tls_sni: target.smi2.net, tls_version: TLS 1.2
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 97, flow_bytes_toclient: 131, flow_age: 1, flow_state: established, flow_reason: timeout ; pcap_cnt: 6484767, event_type: dns, proto: UDP, dns_type: query, dns_id: 36642, dns_rrname: 17.149.192.91.in-addr.arpa, dns_rrtype: PTR, dns_tx_id: 0 ; pcap_cnt: 6485022, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 36642, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: 17.149.192.91.in-addr.arpa, dns_rrtype: PTR, dns_rcode: NOERROR, dns_answers_0_rrname: 17.149.192.91.in-addr.arpa, dns_answers_0_rrtype: PTR, dns_answers_0_ttl: 3600, dns_answers_0_rdata: autocontext.begun.ru, dns_grouped_PTR_0: autocontext.begun.ru
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 86, flow_bytes_toclient: 102, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 6486659, event_type: dns, proto: UDP, dns_type: query, dns_id: 26483, dns_rrname: st.targetix.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 6486704, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 26483, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: st.targetix.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: st.targetix.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 2773, dns_answers_0_rdata: 212.8.236.36, dns_grouped_A_0: 212.8.236.36
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 160, flow_bytes_toclient: 192, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 6487789, event_type: dns, proto: UDP, dns_type: query, dns_id: 11559, dns_rrname: cas.ny.us.criteo.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 6487791, event_type: dns, proto: UDP, dns_type: query, dns_id: 11559, dns_rrname: cas.ny.us.criteo.com, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 6487792, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 11559, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: cas.ny.us.criteo.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: cas.ny.us.criteo.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 1036, dns_answers_0_rdata: 74.119.118.86, dns_grouped_A_0: 74.119.118.86 ; pcap_cnt: 6487793, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 11559, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: cas.ny.us.criteo.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: cas.ny.us.criteo.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 1036, dns_answers_0_rdata: 74.119.118.86, dns_grouped_A_0: 74.119.118.86
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 12, flow_pkts_toclient: 10, flow_bytes_toserver: 1471, flow_bytes_toclient: 4061, flow_age: 5, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6490027, event_type: tls, proto: TCP, tls_sni: dt.videohub.tv, tls_version: UNDETERMINED
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 174, flow_bytes_toclient: 294, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 6491043, event_type: dns, proto: UDP, dns_type: query, dns_id: 40936, dns_rrname: 37.164.167.185.in-addr.arpa, dns_rrtype: PTR, dns_tx_id: 0 ; pcap_cnt: 6491044, event_type: dns, proto: UDP, dns_type: query, dns_id: 40936, dns_rrname: 37.164.167.185.in-addr.arpa, dns_rrtype: PTR, dns_tx_id: 1 ; pcap_cnt: 6491128, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 40936, dns_flags: 8183, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: 37.164.167.185.in-addr.arpa, dns_rrtype: PTR, dns_rcode: NXDOMAIN, dns_authorities_0_rrname: 185.in-addr.arpa, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 900, dns_authorities_0_soa_mname: pri.authdns.ripe.net, dns_authorities_0_soa_rname: dns.ripe.net, dns_authorities_0_soa_serial: 1499088023, dns_authorities_0_soa_refresh: 3600, dns_authorities_0_soa_retry: 600, dns_authorities_0_soa_expire: 864000, dns_authorities_0_soa_minimum: 3600 ; pcap_cnt: 6491129, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 40936, dns_flags: 8183, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: 37.164.167.185.in-addr.arpa, dns_rrtype: PTR, dns_rcode: NXDOMAIN, dns_authorities_0_rrname: 185.in-addr.arpa, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 900, dns_authorities_0_soa_mname: pri.authdns.ripe.net, dns_authorities_0_soa_rname: dns.ripe.net, dns_authorities_0_soa_serial: 1499088023, dns_authorities_0_soa_refresh: 3600, dns_authorities_0_soa_retry: 600, dns_authorities_0_soa_expire: 864000, dns_authorities_0_soa_minimum: 3600
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 79, flow_bytes_toclient: 164, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 6490628, event_type: dns, proto: UDP, dns_type: query, dns_id: 28767, dns_rrname: app.link, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 6490672, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 28767, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: app.link, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: app.link, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 133, dns_authorities_0_soa_mname: ns-1521.awsdns-62.org, dns_authorities_0_soa_rname: awsdns-hostmaster.amazon.com, dns_authorities_0_soa_serial: 1, dns_authorities_0_soa_refresh: 7200, dns_authorities_0_soa_retry: 900, dns_authorities_0_soa_expire: 1209600, dns_authorities_0_soa_minimum: 86400
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 160, flow_bytes_toclient: 224, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 6492868, event_type: dns, proto: UDP, dns_type: query, dns_id: 58640, dns_rrname: a771.dscq.akamai.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 6492869, event_type: dns, proto: UDP, dns_type: query, dns_id: 58640, dns_rrname: a771.dscq.akamai.net, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 6492870, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 58640, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: a771.dscq.akamai.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: a771.dscq.akamai.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 1, dns_answers_0_rdata: 38.93.140.72, dns_answers_1_rrname: a771.dscq.akamai.net, dns_answers_1_rrtype: A, dns_answers_1_ttl: 1, dns_answers_1_rdata: 38.93.140.48, dns_grouped_A_0: 38.93.140.72, dns_grouped_A_1: 38.93.140.48 ; pcap_cnt: 6492871, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 58640, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: a771.dscq.akamai.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: a771.dscq.akamai.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 1, dns_answers_0_rdata: 38.93.140.72, dns_answers_1_rrname: a771.dscq.akamai.net, dns_answers_1_rrtype: A, dns_answers_1_ttl: 1, dns_answers_1_rdata: 38.93.140.48, dns_grouped_A_0: 38.93.140.72, dns_grouped_A_1: 38.93.140.48
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 98, flow_bytes_toclient: 98, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 6493454, event_type: dns, proto: UDP, dns_type: query, dns_id: 42149, dns_rrname: 32.200.154.156.in-addr.arpa, dns_rrtype: PTR, dns_tx_id: 0 ; pcap_cnt: 6493825, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 42149, dns_flags: 8182, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: 32.200.154.156.in-addr.arpa, dns_rrtype: PTR, dns_rcode: SERVFAIL
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 9, flow_pkts_toclient: 8, flow_bytes_toserver: 879, flow_bytes_toclient: 4294, flow_age: 6, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1f, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6494648, event_type: tls, proto: TCP, tls_session_resumed: True, tls_sni: p.mmsho.com, tls_version: TLS 1.2
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 152, flow_bytes_toclient: 266, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 6495357, event_type: dns, proto: UDP, dns_type: query, dns_id: 46455, dns_rrname: ocsp.godaddy.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 6495358, event_type: dns, proto: UDP, dns_type: query, dns_id: 46455, dns_rrname: ocsp.godaddy.com, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 6495360, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 46455, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: ocsp.godaddy.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: ocsp.godaddy.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 2556, dns_answers_0_rdata: ocsp.godaddy.com.akadns.net, dns_answers_1_rrname: ocsp.godaddy.com.akadns.net, dns_answers_1_rrtype: A, dns_answers_1_ttl: 0, dns_answers_1_rdata: 72.167.239.239, dns_grouped_A_0: 72.167.239.239, dns_grouped_CNAME_0: ocsp.godaddy.com.akadns.net ; pcap_cnt: 6495361, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 46455, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: ocsp.godaddy.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: ocsp.godaddy.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 2556, dns_answers_0_rdata: ocsp.godaddy.com.akadns.net, dns_answers_1_rrname: ocsp.godaddy.com.akadns.net, dns_answers_1_rrtype: A, dns_answers_1_ttl: 0, dns_answers_1_rdata: 72.167.239.239, dns_grouped_CNAME_0: ocsp.godaddy.com.akadns.net, dns_grouped_A_0: 72.167.239.239
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 162, flow_bytes_toclient: 194, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 6499951, event_type: dns, proto: UDP, dns_type: query, dns_id: 18231, dns_rrname: pixel-a.sitescout.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 6499952, event_type: dns, proto: UDP, dns_type: query, dns_id: 18231, dns_rrname: pixel-a.sitescout.com, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 6499954, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 18231, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: pixel-a.sitescout.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: pixel-a.sitescout.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 0, dns_answers_0_rdata: 209.15.36.33, dns_grouped_A_0: 209.15.36.33 ; pcap_cnt: 6499955, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 18231, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: pixel-a.sitescout.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: pixel-a.sitescout.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 0, dns_answers_0_rdata: 209.15.36.33, dns_grouped_A_0: 209.15.36.33
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 50, flow_pkts_toclient: 57, flow_bytes_toserver: 12961, flow_bytes_toclient: 70464, flow_age: 129, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6504994, event_type: anomaly, proto: TCP, tx_id: 0, anomaly_app_proto: http, anomaly_type: applayer, anomaly_event: GZIP_DECOMPRESSION_FAILED, anomaly_layer: proto_parser ; pcap_cnt: 6504997, event_type: anomaly, proto: TCP, tx_id: 0, anomaly_app_proto: http, anomaly_type: applayer, anomaly_event: GZIP_DECOMPRESSION_FAILED, anomaly_layer: proto_parser ; pcap_cnt: 6504997, event_type: anomaly, proto: TCP, tx_id: 0, anomaly_app_proto: http, anomaly_type: applayer, anomaly_event: GZIP_DECOMPRESSION_FAILED, anomaly_layer: proto_parser ; pcap_cnt: 6504997, event_type: anomaly, proto: TCP, tx_id: 0, anomaly_app_proto: http, anomaly_type: applayer, anomaly_event: GZIP_DECOMPRESSION_FAILED, anomaly_layer: proto_parser ; pcap_cnt: 6504997, event_type: anomaly, proto: TCP, tx_id: 0, anomaly_app_proto: http, anomaly_type: applayer, anomaly_event: GZIP_DECOMPRESSION_FAILED, anomaly_layer: proto_parser ; pcap_cnt: 6505045, event_type: anomaly, proto: TCP, tx_id: 0, anomaly_app_proto: http, anomaly_type: applayer, anomaly_event: INVALID_RESPONSE_CHUNK_LEN, anomaly_layer: proto_parser ; pcap_cnt: 6505197, event_type: http, proto: TCP, tx_id: 0, http_hostname: www.rakuten.co.jp, http_url: /, http_http_user_agent: Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:31.0) Gecko/20100101 Firefox/31.0, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 34818 ; event_type: fileinfo, proto: TCP, http_hostname: www.rakuten.co.jp, http_url: /, http_http_user_agent: Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:31.0) Gecko/20100101 Firefox/31.0, http_http_content_type: text/html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 34818, app_proto: http, fileinfo_filename: /, fileinfo_gaps: True, fileinfo_state: TRUNCATED, fileinfo_stored: False, fileinfo_size: 42155, fileinfo_tx_id: 0
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 16, flow_pkts_toclient: 20, flow_bytes_toserver: 3147, flow_bytes_toclient: 15272, flow_age: 1, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6508616, event_type: tls, proto: TCP, tls_subject: C=JP, ST=Tokyo, L=Setagaya-ku, O=Rakuten,Inc., OU=Develop01, CN=*.api.ias.rakuten.co.jp, tls_issuerdn: C=US, O=Symantec Corporation, OU=Symantec Trust Network, CN=Symantec Class 3 Secure Server CA - G4, tls_serial: 6A:5B:E7:0E:06:99:EC:E6:E9:AC:B1:A5:43:35:B4:CF, tls_fingerprint: 0c:28:44:fa:f4:24:a6:ef:59:e8:35:63:e0:27:5d:06:9b:29:a8:49, tls_sni: grp301.api.ias.rakuten.co.jp, tls_version: TLS 1.2, tls_notbefore: 2016-10-06T00:00:00, tls_notafter: 2017-10-06T23:59:59
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 354, flow_pkts_toclient: 549, flow_bytes_toserver: 58962, flow_bytes_toclient: 990100, flow_age: 57, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6508288, event_type: tls, proto: TCP, tls_session_resumed: True, tls_sni: www.elcomercio.com, tls_version: TLSv1
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 38, flow_pkts_toclient: 26, flow_bytes_toserver: 16415, flow_bytes_toclient: 5112, flow_age: 55, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6511954, event_type: tls, proto: TCP, tls_session_resumed: True, tls_sni: cm.g.doubleclick.net, tls_version: TLSv1
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 18, flow_pkts_toclient: 13, flow_bytes_toserver: 2671, flow_bytes_toclient: 9967, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6524501, event_type: tls, proto: TCP, tls_session_resumed: True, tls_sni: www.googletagservices.com, tls_version: TLSv1
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 19, flow_pkts_toclient: 15, flow_bytes_toserver: 4778, flow_bytes_toclient: 8990, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6525673, event_type: tls, proto: TCP, tls_session_resumed: True, tls_sni: ad.doubleclick.net, tls_version: TLSv1
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 91, flow_bytes_toclient: 107, flow_age: 1, flow_state: established, flow_reason: timeout ; pcap_cnt: 6530561, event_type: dns, proto: UDP, dns_type: query, dns_id: 15877, dns_rrname: beauty.rakuten.co.jp, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 6530624, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 15877, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: beauty.rakuten.co.jp, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: beauty.rakuten.co.jp, dns_answers_0_rrtype: A, dns_answers_0_ttl: 300, dns_answers_0_rdata: 133.237.48.198, dns_grouped_A_0: 133.237.48.198
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 180, flow_bytes_toclient: 246, flow_age: 185, flow_state: established, flow_reason: timeout ; pcap_cnt: 6530730, event_type: dns, proto: UDP, dns_type: query, dns_id: 30956, dns_rrname: cdn3-s-hw-e5.xtube.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 6530809, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 30956, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: cdn3-s-hw-e5.xtube.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: cdn3-s-hw-e5.xtube.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 3600, dns_answers_0_rdata: vip0x01b.ssl.rncdn5.com, dns_answers_1_rrname: vip0x01b.ssl.rncdn5.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 1512, dns_answers_1_rdata: 205.185.208.27, dns_grouped_A_0: 205.185.208.27, dns_grouped_CNAME_0: vip0x01b.ssl.rncdn5.com ; pcap_cnt: 6586139, event_type: dns, proto: UDP, dns_type: query, dns_id: 17093, dns_rrname: cdn2.pollster.pl, dns_rrtype: A, dns_tx_id: 2 ; pcap_cnt: 6586143, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 17093, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: cdn2.pollster.pl, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: cdn2.pollster.pl, dns_answers_0_rrtype: A, dns_answers_0_ttl: 3464, dns_answers_0_rdata: 212.180.241.221, dns_grouped_A_0: 212.180.241.221
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 166, flow_bytes_toclient: 266, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 6531518, event_type: dns, proto: UDP, dns_type: query, dns_id: 44488, dns_rrname: stats.g.doubleclick.net, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 6531519, event_type: dns, proto: UDP, dns_type: query, dns_id: 44488, dns_rrname: stats.g.doubleclick.net, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 6531549, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 44488, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: stats.g.doubleclick.net, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: stats.g.doubleclick.net, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 13939, dns_answers_0_rdata: stats.l.doubleclick.net, dns_answers_1_rrname: stats.l.doubleclick.net, dns_answers_1_rrtype: AAAA, dns_answers_1_ttl: 1, dns_answers_1_rdata: 2607:f8b0:400d:0c0b:0000:0000:0000:009b, dns_grouped_AAAA_0: 2607:f8b0:400d:0c0b:0000:0000:0000:009b, dns_grouped_CNAME_0: stats.l.doubleclick.net ; pcap_cnt: 6531550, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 44488, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: stats.g.doubleclick.net, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: stats.g.doubleclick.net, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 13939, dns_answers_0_rdata: stats.l.doubleclick.net, dns_answers_1_rrname: stats.l.doubleclick.net, dns_answers_1_rrtype: AAAA, dns_answers_1_ttl: 1, dns_answers_1_rdata: 2607:f8b0:400d:0c0b:0000:0000:0000:009b, dns_grouped_CNAME_0: stats.l.doubleclick.net, dns_grouped_AAAA_0: 2607:f8b0:400d:0c0b:0000:0000:0000:009b
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 164, flow_bytes_toclient: 196, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 6532223, event_type: dns, proto: UDP, dns_type: query, dns_id: 23448, dns_rrname: www.rakuten-card.co.jp, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 6532224, event_type: dns, proto: UDP, dns_type: query, dns_id: 23448, dns_rrname: www.rakuten-card.co.jp, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 6532780, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 23448, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.rakuten-card.co.jp, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: www.rakuten-card.co.jp, dns_answers_0_rrtype: A, dns_answers_0_ttl: 4, dns_answers_0_rdata: 210.162.157.17, dns_grouped_A_0: 210.162.157.17 ; pcap_cnt: 6532781, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 23448, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.rakuten-card.co.jp, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: www.rakuten-card.co.jp, dns_answers_0_rrtype: A, dns_answers_0_ttl: 4, dns_answers_0_rdata: 210.162.157.17, dns_grouped_A_0: 210.162.157.17
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 10, flow_pkts_toclient: 9, flow_bytes_toserver: 944, flow_bytes_toclient: 6645, flow_age: 5, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6537139, event_type: tls, proto: TCP, tls_subject: CN=us.tags.newscgp.com, tls_issuerdn: C=US, O=Amazon, OU=Server CA 1B, CN=Amazon, tls_serial: 06:68:CA:53:1E:59:69:A2:D9:2F:C2:D1:E1:D1:31:7F, tls_fingerprint: 02:58:fd:5f:da:41:5a:b1:48:54:46:35:e8:4e:4c:3d:9a:42:da:7d, tls_sni: tags.barrons.com, tls_version: TLS 1.2, tls_notbefore: 2017-03-28T00:00:00, tls_notafter: 2018-04-28T12:00:00
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 8, flow_pkts_toclient: 8, flow_bytes_toserver: 1333, flow_bytes_toclient: 3607, flow_age: 5, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6541088, event_type: tls, proto: TCP, tls_subject: C=US, ST=California, L=Redwood City, O=Turn Inc., CN=*.turn.com, tls_issuerdn: C=US, O=DigiCert Inc, CN=DigiCert SHA2 Secure Server CA, tls_serial: 0D:D5:CD:72:94:88:20:3E:E4:55:7F:00:31:F3:BD:6A, tls_fingerprint: c3:f2:f2:8b:30:d3:85:59:58:0b:f2:c7:44:91:10:21:2b:49:9c:9f, tls_sni: d.turn.com, tls_version: TLS 1.2, tls_notbefore: 2016-12-21T00:00:00, tls_notafter: 2018-01-30T12:00:00
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 164, flow_bytes_toclient: 284, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 6545263, event_type: dns, proto: UDP, dns_type: query, dns_id: 5379, dns_rrname: dart.l.doubleclick.net, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 6545264, event_type: dns, proto: UDP, dns_type: query, dns_id: 5379, dns_rrname: dart.l.doubleclick.net, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 6545267, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 5379, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: dart.l.doubleclick.net, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: l.doubleclick.net, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 60, dns_authorities_0_soa_mname: ns2.google.com, dns_authorities_0_soa_rname: dns-admin.google.com, dns_authorities_0_soa_serial: 160815405, dns_authorities_0_soa_refresh: 900, dns_authorities_0_soa_retry: 900, dns_authorities_0_soa_expire: 1800, dns_authorities_0_soa_minimum: 60 ; pcap_cnt: 6545268, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 5379, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: dart.l.doubleclick.net, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: l.doubleclick.net, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 60, dns_authorities_0_soa_mname: ns2.google.com, dns_authorities_0_soa_rname: dns-admin.google.com, dns_authorities_0_soa_serial: 160815405, dns_authorities_0_soa_refresh: 900, dns_authorities_0_soa_retry: 900, dns_authorities_0_soa_expire: 1800, dns_authorities_0_soa_minimum: 60
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 9, flow_pkts_toclient: 6, flow_bytes_toserver: 1189, flow_bytes_toclient: 595, flow_age: 6, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1f, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6551436, event_type: tls, proto: TCP, tls_session_resumed: True, tls_sni: tag-st.contextweb.com, tls_version: TLS 1.2
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 4, flow_pkts_toclient: 2, flow_bytes_toserver: 352, flow_bytes_toclient: 346, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 6551689, event_type: dns, proto: UDP, dns_type: query, dns_id: 37933, dns_rrname: versioncheck.prod.mozaws.net, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 6551690, event_type: dns, proto: UDP, dns_type: query, dns_id: 37933, dns_rrname: versioncheck.prod.mozaws.net, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 6551692, event_type: dns, proto: UDP, dns_type: query, dns_id: 37933, dns_rrname: versioncheck.prod.mozaws.net, dns_rrtype: AAAA, dns_tx_id: 2 ; pcap_cnt: 6551693, event_type: dns, proto: UDP, dns_type: query, dns_id: 37933, dns_rrname: versioncheck.prod.mozaws.net, dns_rrtype: AAAA, dns_tx_id: 3 ; pcap_cnt: 6551695, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 37933, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: versioncheck.prod.mozaws.net, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: prod.mozaws.net, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 70, dns_authorities_0_soa_mname: ns-1260.awsdns-29.org, dns_authorities_0_soa_rname: awsdns-hostmaster.amazon.com, dns_authorities_0_soa_serial: 1, dns_authorities_0_soa_refresh: 7200, dns_authorities_0_soa_retry: 900, dns_authorities_0_soa_expire: 1209600, dns_authorities_0_soa_minimum: 86400 ; pcap_cnt: 6551696, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 37933, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: versioncheck.prod.mozaws.net, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: prod.mozaws.net, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 70, dns_authorities_0_soa_mname: ns-1260.awsdns-29.org, dns_authorities_0_soa_rname: awsdns-hostmaster.amazon.com, dns_authorities_0_soa_serial: 1, dns_authorities_0_soa_refresh: 7200, dns_authorities_0_soa_retry: 900, dns_authorities_0_soa_expire: 1209600, dns_authorities_0_soa_minimum: 86400
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 168, flow_bytes_toclient: 312, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 6562545, event_type: dns, proto: UDP, dns_type: query, dns_id: 17540, dns_rrname: www.google-analytics.com, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 6562546, event_type: dns, proto: UDP, dns_type: query, dns_id: 17540, dns_rrname: www.google-analytics.com, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 6562634, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 17540, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.google-analytics.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: www.google-analytics.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 7597, dns_answers_0_rdata: www-google-analytics.l.google.com, dns_answers_1_rrname: www-google-analytics.l.google.com, dns_answers_1_rrtype: AAAA, dns_answers_1_ttl: 123, dns_answers_1_rdata: 2607:f8b0:4006:0814:0000:0000:0000:200e, dns_grouped_AAAA_0: 2607:f8b0:4006:0814:0000:0000:0000:200e, dns_grouped_CNAME_0: www-google-analytics.l.google.com ; pcap_cnt: 6562635, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 17540, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.google-analytics.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: www.google-analytics.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 7597, dns_answers_0_rdata: www-google-analytics.l.google.com, dns_answers_1_rrname: www-google-analytics.l.google.com, dns_answers_1_rrtype: AAAA, dns_answers_1_ttl: 123, dns_answers_1_rdata: 2607:f8b0:4006:0814:0000:0000:0000:200e, dns_grouped_CNAME_0: www-google-analytics.l.google.com, dns_grouped_AAAA_0: 2607:f8b0:4006:0814:0000:0000:0000:200e
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 87, flow_bytes_toclient: 193, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 6569071, event_type: dns, proto: UDP, dns_type: query, dns_id: 42387, dns_rrname: track.adform.net, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 6569119, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 42387, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: track.adform.net, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: track.adform.net, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 88, dns_answers_0_rdata: track-eu.adformnet.akadns.net, dns_grouped_CNAME_0: track-eu.adformnet.akadns.net, dns_authorities_0_rrname: akadns.net, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 179, dns_authorities_0_soa_mname: internal.akadns.net, dns_authorities_0_soa_rname: hostmaster.akamai.com, dns_authorities_0_soa_serial: 1499088338, dns_authorities_0_soa_refresh: 90000, dns_authorities_0_soa_retry: 90000, dns_authorities_0_soa_expire: 90000, dns_authorities_0_soa_minimum: 180
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 136, flow_bytes_toclient: 168, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 6569354, event_type: dns, proto: UDP, dns_type: query, dns_id: 43492, dns_rrname: 10.im.cz, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 6569355, event_type: dns, proto: UDP, dns_type: query, dns_id: 43492, dns_rrname: 10.im.cz, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 6569485, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 43492, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: 10.im.cz, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: 10.im.cz, dns_answers_0_rrtype: A, dns_answers_0_ttl: 300, dns_answers_0_rdata: 77.75.78.19, dns_grouped_A_0: 77.75.78.19 ; pcap_cnt: 6569486, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 43492, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: 10.im.cz, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: 10.im.cz, dns_answers_0_rrtype: A, dns_answers_0_ttl: 300, dns_answers_0_rdata: 77.75.78.19, dns_grouped_A_0: 77.75.78.19
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 95, flow_bytes_toclient: 170, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 6569501, event_type: dns, proto: UDP, dns_type: query, dns_id: 18428, dns_rrname: pixel-origin.mathtag.com, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 6569502, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 18428, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: pixel-origin.mathtag.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: mathtag.com, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 1, dns_authorities_0_soa_mname: ns1.p06.dynect.net, dns_authorities_0_soa_rname: technology.mediamath.com, dns_authorities_0_soa_serial: 422082, dns_authorities_0_soa_refresh: 3600, dns_authorities_0_soa_retry: 600, dns_authorities_0_soa_expire: 604800, dns_authorities_0_soa_minimum: 60
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 154, flow_bytes_toclient: 186, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 6574115, event_type: dns, proto: UDP, dns_type: query, dns_id: 10418, dns_rrname: ocsp.comodoca.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 6574116, event_type: dns, proto: UDP, dns_type: query, dns_id: 10418, dns_rrname: ocsp.comodoca.com, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 6574117, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 10418, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: ocsp.comodoca.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: ocsp.comodoca.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 78, dns_answers_0_rdata: 178.255.83.1, dns_grouped_A_0: 178.255.83.1 ; pcap_cnt: 6574118, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 10418, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: ocsp.comodoca.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: ocsp.comodoca.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 78, dns_answers_0_rdata: 178.255.83.1, dns_grouped_A_0: 178.255.83.1
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 152, flow_bytes_toclient: 242, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 6578540, event_type: dns, proto: UDP, dns_type: query, dns_id: 44761, dns_rrname: www.facebook.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 6578541, event_type: dns, proto: UDP, dns_type: query, dns_id: 44761, dns_rrname: www.facebook.com, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 6578542, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 44761, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.facebook.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: www.facebook.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 572, dns_answers_0_rdata: star-mini.c10r.facebook.com, dns_answers_1_rrname: star-mini.c10r.facebook.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 0, dns_answers_1_rdata: 31.13.71.36, dns_grouped_A_0: 31.13.71.36, dns_grouped_CNAME_0: star-mini.c10r.facebook.com ; pcap_cnt: 6578543, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 44761, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.facebook.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: www.facebook.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 572, dns_answers_0_rdata: star-mini.c10r.facebook.com, dns_answers_1_rrname: star-mini.c10r.facebook.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 0, dns_answers_1_rdata: 31.13.71.36, dns_grouped_A_0: 31.13.71.36, dns_grouped_CNAME_0: star-mini.c10r.facebook.com
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 14, flow_pkts_toclient: 13, flow_bytes_toserver: 1883, flow_bytes_toclient: 5370, flow_age: 0, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: ETPRO.Lazarus1, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6578029, event_type: tls, proto: TCP, metadata_flowbits_0: ETPRO.Lazarus1, tls_session_resumed: True, tls_sni: www.google.com, tls_version: TLS 1.2
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 178, flow_bytes_toclient: 304, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 6580975, event_type: dns, proto: UDP, dns_type: query, dns_id: 45240, dns_rrname: safebrowsing-cache.google.com, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 6580976, event_type: dns, proto: UDP, dns_type: query, dns_id: 45240, dns_rrname: safebrowsing-cache.google.com, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 6580981, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 45240, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: safebrowsing-cache.google.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: safebrowsing-cache.google.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 21610, dns_answers_0_rdata: safebrowsing.cache.l.google.com, dns_answers_1_rrname: safebrowsing.cache.l.google.com, dns_answers_1_rrtype: AAAA, dns_answers_1_ttl: 180, dns_answers_1_rdata: 2607:f8b0:4006:080f:0000:0000:0000:200e, dns_grouped_CNAME_0: safebrowsing.cache.l.google.com, dns_grouped_AAAA_0: 2607:f8b0:4006:080f:0000:0000:0000:200e ; pcap_cnt: 6580982, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 45240, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: safebrowsing-cache.google.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: safebrowsing-cache.google.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 21610, dns_answers_0_rdata: safebrowsing.cache.l.google.com, dns_answers_1_rrname: safebrowsing.cache.l.google.com, dns_answers_1_rrtype: AAAA, dns_answers_1_ttl: 180, dns_answers_1_rdata: 2607:f8b0:4006:080f:0000:0000:0000:200e, dns_grouped_CNAME_0: safebrowsing.cache.l.google.com, dns_grouped_AAAA_0: 2607:f8b0:4006:080f:0000:0000:0000:200e
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 166, flow_bytes_toclient: 198, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 6586160, event_type: dns, proto: UDP, dns_type: query, dns_id: 22147, dns_rrname: e8960.e2.akamaiedge.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 6586161, event_type: dns, proto: UDP, dns_type: query, dns_id: 22147, dns_rrname: e8960.e2.akamaiedge.net, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 6586162, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 22147, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: e8960.e2.akamaiedge.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: e8960.e2.akamaiedge.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 0, dns_answers_0_rdata: 23.208.163.37, dns_grouped_A_0: 23.208.163.37 ; pcap_cnt: 6586163, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 22147, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: e8960.e2.akamaiedge.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: e8960.e2.akamaiedge.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 0, dns_answers_0_rdata: 23.208.163.37, dns_grouped_A_0: 23.208.163.37
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 94, flow_bytes_toclient: 148, flow_age: 1, flow_state: established, flow_reason: timeout ; pcap_cnt: 6587262, event_type: dns, proto: UDP, dns_type: query, dns_id: 37843, dns_rrname: 34.72.43.8.in-addr.arpa, dns_rrtype: PTR, dns_tx_id: 0 ; pcap_cnt: 6587269, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 37843, dns_flags: 8183, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: 34.72.43.8.in-addr.arpa, dns_rrtype: PTR, dns_rcode: NXDOMAIN, dns_authorities_0_rrname: 8.in-addr.arpa, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 84329, dns_authorities_0_soa_mname: ns2.Level3.net, dns_authorities_0_soa_rname: dns.Level3.net, dns_authorities_0_soa_serial: 2017070300, dns_authorities_0_soa_refresh: 3600, dns_authorities_0_soa_retry: 900, dns_authorities_0_soa_expire: 864000, dns_authorities_0_soa_minimum: 86400
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 174, flow_bytes_toclient: 282, flow_age: 1, flow_state: established, flow_reason: timeout ; pcap_cnt: 6592676, event_type: dns, proto: UDP, dns_type: query, dns_id: 27903, dns_rrname: 184.152.51.198.in-addr.arpa, dns_rrtype: PTR, dns_tx_id: 0 ; pcap_cnt: 6592678, event_type: dns, proto: UDP, dns_type: query, dns_id: 27903, dns_rrname: 184.152.51.198.in-addr.arpa, dns_rrtype: PTR, dns_tx_id: 1 ; pcap_cnt: 6592707, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 27903, dns_flags: 8183, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: 184.152.51.198.in-addr.arpa, dns_rrtype: PTR, dns_rcode: NXDOMAIN, dns_authorities_0_rrname: 198.in-addr.arpa, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 900, dns_authorities_0_soa_mname: z.arin.net, dns_authorities_0_soa_rname: dns-ops.arin.net, dns_authorities_0_soa_serial: 2017023082, dns_authorities_0_soa_refresh: 1800, dns_authorities_0_soa_retry: 900, dns_authorities_0_soa_expire: 691200, dns_authorities_0_soa_minimum: 10800 ; pcap_cnt: 6592708, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 27903, dns_flags: 8183, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: 184.152.51.198.in-addr.arpa, dns_rrtype: PTR, dns_rcode: NXDOMAIN, dns_authorities_0_rrname: 198.in-addr.arpa, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 900, dns_authorities_0_soa_mname: z.arin.net, dns_authorities_0_soa_rname: dns-ops.arin.net, dns_authorities_0_soa_serial: 2017023082, dns_authorities_0_soa_refresh: 1800, dns_authorities_0_soa_retry: 900, dns_authorities_0_soa_expire: 691200, dns_authorities_0_soa_minimum: 10800
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 162, flow_bytes_toclient: 260, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 6594160, event_type: dns, proto: UDP, dns_type: query, dns_id: 24215, dns_rrname: pixel.advertising.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 6594161, event_type: dns, proto: UDP, dns_type: query, dns_id: 24215, dns_rrname: pixel.advertising.com, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 6594229, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 24215, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: pixel.advertising.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: pixel.advertising.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 169, dns_answers_0_rdata: dmppixel.egslb.aol.com, dns_answers_1_rrname: dmppixel.egslb.aol.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 1, dns_answers_1_rdata: 64.12.245.38, dns_grouped_CNAME_0: dmppixel.egslb.aol.com, dns_grouped_A_0: 64.12.245.38 ; pcap_cnt: 6594230, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 24215, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: pixel.advertising.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: pixel.advertising.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 169, dns_answers_0_rdata: dmppixel.egslb.aol.com, dns_answers_1_rrname: dmppixel.egslb.aol.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 1, dns_answers_1_rdata: 64.12.245.38, dns_grouped_CNAME_0: dmppixel.egslb.aol.com, dns_grouped_A_0: 64.12.245.38
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 13, flow_pkts_toclient: 12, flow_bytes_toserver: 1886, flow_bytes_toclient: 6028, flow_age: 12, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6595085, event_type: tls, proto: TCP, tls_subject: C=US, ST=CA, L=Sunnyvale, O=Yahoo! Inc., CN=*.btrll.com, tls_issuerdn: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert SHA2 High Assurance Server CA, tls_serial: 0F:E9:A8:BE:6F:FE:7D:F2:EE:20:7C:13:F1:B1:D6:81, tls_fingerprint: 75:e8:09:d6:3e:e9:d9:21:81:32:5d:ca:ec:5d:0c:b1:ad:a9:70:ea, tls_sni: geo-um.btrll.com, tls_version: TLS 1.2, tls_notbefore: 2017-04-26T00:00:00, tls_notafter: 2017-10-26T12:00:00
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 10, flow_pkts_toclient: 10, flow_bytes_toserver: 1507, flow_bytes_toclient: 6987, flow_age: 7, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6596225, event_type: tls, proto: TCP, tls_session_resumed: True, tls_sni: loadm.exelator.com, tls_version: TLS 1.2
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 31, flow_pkts_toclient: 29, flow_bytes_toserver: 2748, flow_bytes_toclient: 25350, flow_age: 67, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6596428, event_type: tls, proto: TCP, tls_session_resumed: True, tls_sni: www.sindonews.com, tls_version: TLS 1.2
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 106, flow_bytes_toclient: 159, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 6596538, event_type: dns, proto: UDP, dns_type: query, dns_id: 31314, dns_rrname: ocsp-ds.ws.symantec.com.edgekey.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 6596543, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 31314, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: ocsp-ds.ws.symantec.com.edgekey.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: ocsp-ds.ws.symantec.com.edgekey.net, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 1, dns_answers_0_rdata: e8218.dscb1.akamaiedge.net, dns_answers_1_rrname: e8218.dscb1.akamaiedge.net, dns_answers_1_rrtype: A, dns_answers_1_ttl: 1, dns_answers_1_rdata: 23.50.75.27, dns_grouped_CNAME_0: e8218.dscb1.akamaiedge.net, dns_grouped_A_0: 23.50.75.27
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 17, flow_pkts_toclient: 17, flow_bytes_toserver: 1897, flow_bytes_toclient: 7875, flow_age: 66, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6599047, event_type: tls, proto: TCP, tls_subject: CN=*.sindonews.net, tls_issuerdn: C=US, O=GeoTrust Inc., CN=RapidSSL SHA256 CA - G2, tls_serial: 77:9A:19:84:3C:63:DC:AE:F5:D2:E1:E3:FF:50:E1:8A, tls_fingerprint: f6:db:8a:78:5d:1c:53:2a:d3:19:f5:38:93:ff:fe:a8:79:8f:ad:d0, tls_sni: cdn-y.sindonews.net, tls_version: TLS 1.2, tls_notbefore: 2017-03-24T00:00:00, tls_notafter: 2018-05-23T23:59:59
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 5, flow_pkts_toclient: 5, flow_bytes_toserver: 649, flow_bytes_toclient: 658, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6601492, event_type: http, proto: TCP, tx_id: 0, http_hostname: i.imgur.com, http_url: /ulyqevm.jpg, http_http_user_agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36, http_http_content_type: , http_http_refer: http://www.la-roza.com/video/, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 403, http_length: 0
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 3, flow_pkts_toclient: 3, flow_bytes_toserver: 267, flow_bytes_toclient: 336, flow_age: 195, flow_state: established, flow_reason: timeout ; pcap_cnt: 6601788, event_type: dns, proto: UDP, dns_type: query, dns_id: 10132, dns_rrname: s0-2mdn-net.l.google.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 6601949, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 10132, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: s0-2mdn-net.l.google.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: s0-2mdn-net.l.google.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 260, dns_answers_0_rdata: 172.217.6.198, dns_grouped_A_0: 172.217.6.198 ; pcap_cnt: 6644205, event_type: dns, proto: UDP, dns_type: query, dns_id: 56685, dns_rrname: play.google.com, dns_rrtype: A, dns_tx_id: 2 ; pcap_cnt: 6644209, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 56685, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: play.google.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: play.google.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 31, dns_answers_0_rdata: play.l.google.com, dns_answers_1_rrname: play.l.google.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 295, dns_answers_1_rdata: 172.217.10.14, dns_grouped_A_0: 172.217.10.14, dns_grouped_CNAME_0: play.l.google.com ; pcap_cnt: 6662383, event_type: dns, proto: UDP, dns_type: query, dns_id: 38890, dns_rrname: pix.impdesk.com, dns_rrtype: A, dns_tx_id: 4 ; pcap_cnt: 6662463, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 38890, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: pix.impdesk.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: pix.impdesk.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 130, dns_answers_0_rdata: 107.178.255.114, dns_grouped_A_0: 107.178.255.114
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 25, flow_pkts_toclient: 19, flow_bytes_toserver: 4210, flow_bytes_toclient: 2429, flow_age: 117, flow_state: closed, flow_reason: timeout, metadata_flowbits_0: ETPRO.Lazarus1, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6602213, event_type: tls, proto: TCP, metadata_flowbits_0: ETPRO.Lazarus1, tls_session_resumed: True, tls_sni: www.google.com, tls_version: TLS 1.2
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 148, flow_bytes_toclient: 180, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 6601570, event_type: dns, proto: UDP, dns_type: query, dns_id: 46604, dns_rrname: www.google.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 6601571, event_type: dns, proto: UDP, dns_type: query, dns_id: 46604, dns_rrname: www.google.com, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 6601574, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 46604, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.google.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: www.google.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 109, dns_answers_0_rdata: 216.58.217.100, dns_grouped_A_0: 216.58.217.100 ; pcap_cnt: 6601575, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 46604, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.google.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: www.google.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 109, dns_answers_0_rdata: 216.58.217.100, dns_grouped_A_0: 216.58.217.100
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 156, flow_bytes_toclient: 230, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 6609202, event_type: dns, proto: UDP, dns_type: query, dns_id: 38303, dns_rrname: ad.doubleclick.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 6609203, event_type: dns, proto: UDP, dns_type: query, dns_id: 38303, dns_rrname: ad.doubleclick.net, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 6609206, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 38303, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: ad.doubleclick.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: ad.doubleclick.net, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 25097, dns_answers_0_rdata: dart.l.doubleclick.net, dns_answers_1_rrname: dart.l.doubleclick.net, dns_answers_1_rrtype: A, dns_answers_1_ttl: 51, dns_answers_1_rdata: 172.217.10.6, dns_grouped_CNAME_0: dart.l.doubleclick.net, dns_grouped_A_0: 172.217.10.6 ; pcap_cnt: 6609207, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 38303, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: ad.doubleclick.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: ad.doubleclick.net, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 25097, dns_answers_0_rdata: dart.l.doubleclick.net, dns_answers_1_rrname: dart.l.doubleclick.net, dns_answers_1_rrtype: A, dns_answers_1_ttl: 51, dns_answers_1_rdata: 172.217.10.6, dns_grouped_CNAME_0: dart.l.doubleclick.net, dns_grouped_A_0: 172.217.10.6
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 6, flow_pkts_toclient: 5, flow_bytes_toserver: 922, flow_bytes_toclient: 485, flow_age: 17, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1f, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6624207, event_type: tls, proto: TCP, tls_session_resumed: True, tls_sni: bh.contextweb.com, tls_version: TLS 1.2
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 96, flow_bytes_toclient: 150, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 6616210, event_type: dns, proto: UDP, dns_type: query, dns_id: 49635, dns_rrname: 185.79.21.23.in-addr.arpa, dns_rrtype: PTR, dns_tx_id: 0 ; pcap_cnt: 6616236, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 49635, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: 185.79.21.23.in-addr.arpa, dns_rrtype: PTR, dns_rcode: NOERROR, dns_answers_0_rrname: 185.79.21.23.in-addr.arpa, dns_answers_0_rrtype: PTR, dns_answers_0_ttl: 178, dns_answers_0_rdata: ec2-23-21-79-185.compute-1.amazonaws.com, dns_grouped_PTR_0: ec2-23-21-79-185.compute-1.amazonaws.com
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 172, flow_bytes_toclient: 272, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 6622715, event_type: dns, proto: UDP, dns_type: query, dns_id: 51603, dns_rrname: _kerberos._udp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 0 ; pcap_cnt: 6622716, event_type: dns, proto: UDP, dns_type: query, dns_id: 51603, dns_rrname: _kerberos._udp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 1 ; pcap_cnt: 6622719, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 51603, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _kerberos._udp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _kerberos._udp.TESTBED1.CA, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600 ; pcap_cnt: 6622720, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 51603, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _kerberos._udp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _kerberos._udp.TESTBED1.CA, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 146, flow_bytes_toclient: 178, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 6627618, event_type: dns, proto: UDP, dns_type: query, dns_id: 60334, dns_rrname: ce2.uicdn.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 6627619, event_type: dns, proto: UDP, dns_type: query, dns_id: 60334, dns_rrname: ce2.uicdn.net, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 6627620, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 60334, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: ce2.uicdn.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: ce2.uicdn.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 3599, dns_answers_0_rdata: 213.165.66.59, dns_grouped_A_0: 213.165.66.59 ; pcap_cnt: 6627621, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 60334, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: ce2.uicdn.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: ce2.uicdn.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 3599, dns_answers_0_rdata: 213.165.66.59, dns_grouped_A_0: 213.165.66.59
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 152, flow_bytes_toclient: 266, flow_age: 1, flow_state: established, flow_reason: timeout ; pcap_cnt: 6629920, event_type: dns, proto: UDP, dns_type: query, dns_id: 28976, dns_rrname: www.facebook.com, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 6629921, event_type: dns, proto: UDP, dns_type: query, dns_id: 28976, dns_rrname: www.facebook.com, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 6629957, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 28976, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.facebook.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: www.facebook.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 423, dns_answers_0_rdata: star-mini.c10r.facebook.com, dns_answers_1_rrname: star-mini.c10r.facebook.com, dns_answers_1_rrtype: AAAA, dns_answers_1_ttl: 1, dns_answers_1_rdata: 2a03:2880:f112:0083:face:b00c:0000:25de, dns_grouped_CNAME_0: star-mini.c10r.facebook.com, dns_grouped_AAAA_0: 2a03:2880:f112:0083:face:b00c:0000:25de ; pcap_cnt: 6629958, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 28976, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.facebook.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: www.facebook.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 423, dns_answers_0_rdata: star-mini.c10r.facebook.com, dns_answers_1_rrname: star-mini.c10r.facebook.com, dns_answers_1_rrtype: AAAA, dns_answers_1_ttl: 1, dns_answers_1_rdata: 2a03:2880:f112:0083:face:b00c:0000:25de, dns_grouped_AAAA_0: 2a03:2880:f112:0083:face:b00c:0000:25de, dns_grouped_CNAME_0: star-mini.c10r.facebook.com
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 152, flow_bytes_toclient: 208, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 6630803, event_type: dns, proto: UDP, dns_type: query, dns_id: 40285, dns_rrname: www.vektklubb.no, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 6630804, event_type: dns, proto: UDP, dns_type: query, dns_id: 40285, dns_rrname: www.vektklubb.no, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 6630827, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 40285, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.vektklubb.no, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: www.vektklubb.no, dns_answers_0_rrtype: AAAA, dns_answers_0_ttl: 600, dns_answers_0_rdata: 2001:067c:21e0:0000:0000:0000:0000:0065, dns_grouped_AAAA_0: 2001:067c:21e0:0000:0000:0000:0000:0065 ; pcap_cnt: 6630828, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 40285, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.vektklubb.no, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: www.vektklubb.no, dns_answers_0_rrtype: AAAA, dns_answers_0_ttl: 600, dns_answers_0_rdata: 2001:067c:21e0:0000:0000:0000:0000:0065, dns_grouped_AAAA_0: 2001:067c:21e0:0000:0000:0000:0000:0065
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 13, flow_pkts_toclient: 10, flow_bytes_toserver: 2488, flow_bytes_toclient: 6714, flow_age: 63, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6635255, event_type: tls, proto: TCP, tls_session_resumed: True, tls_sni: ssp.streamrail.net, tls_version: TLS 1.2
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 154, flow_bytes_toclient: 186, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 6637948, event_type: dns, proto: UDP, dns_type: query, dns_id: 17563, dns_rrname: global.ib-ibi.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 6637949, event_type: dns, proto: UDP, dns_type: query, dns_id: 17563, dns_rrname: global.ib-ibi.com, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 6637989, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 17563, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: global.ib-ibi.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: global.ib-ibi.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 1, dns_answers_0_rdata: 69.169.86.38, dns_grouped_A_0: 69.169.86.38 ; pcap_cnt: 6637990, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 17563, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: global.ib-ibi.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: global.ib-ibi.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 1, dns_answers_0_rdata: 69.169.86.38, dns_grouped_A_0: 69.169.86.38
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 88, flow_bytes_toclient: 104, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 6640524, event_type: dns, proto: UDP, dns_type: query, dns_id: 11679, dns_rrname: pixel.admedia.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 6640551, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 11679, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: pixel.admedia.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: pixel.admedia.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 73, dns_answers_0_rdata: 204.44.79.6, dns_grouped_A_0: 204.44.79.6
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 11, flow_pkts_toclient: 11, flow_bytes_toserver: 1246, flow_bytes_toclient: 1155, flow_age: 61, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6642185, event_type: http, proto: TCP, tx_id: 0, http_hostname: sync.tidaltv.com, http_url: /GenericUserSync.ashx?dpid=82Redirect, http_http_user_agent: Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:31.0) Gecko/20100101 Firefox/31.0, http_http_content_type: image/gif, http_http_refer: http://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 77 ; pcap_cnt: 6645798, event_type: fileinfo, proto: TCP, http_hostname: sync.tidaltv.com, http_url: /GenericUserSync.ashx?dpid=82Redirect, http_http_user_agent: Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:31.0) Gecko/20100101 Firefox/31.0, http_http_content_type: image/gif, http_http_refer: http://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.html, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 77, app_proto: http, fileinfo_filename: /GenericUserSync.ashx, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 68, fileinfo_tx_id: 0
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 3, flow_pkts_toclient: 3, flow_bytes_toserver: 206, flow_bytes_toclient: 418, flow_age: 5, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 13, tcp_tcp_flags_ts: 13, tcp_tcp_flags_tc: 13, tcp_syn: True, tcp_fin: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6645611, event_type: anomaly, proto: TCP, tx_id: 0, anomaly_app_proto: http, anomaly_type: applayer, anomaly_event: UNABLE_TO_MATCH_RESPONSE_TO_REQUEST, anomaly_layer: proto_parser ; pcap_cnt: 6645621, event_type: http, proto: TCP, tx_id: 0, http_http_port: 0, http_url: /libhtp::request_uri_not_seen, http_http_content_type: text/html, http_status: 408, http_length: 110 ; pcap_cnt: 6645621, event_type: fileinfo, proto: TCP, http_http_port: 0, http_url: /libhtp::request_uri_not_seen, http_http_content_type: text/html, http_status: 408, http_length: 110, app_proto: http, fileinfo_filename: /libhtp::request_uri_not_seen, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 110, fileinfo_tx_id: 0
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 131, flow_pkts_toclient: 186, flow_bytes_toserver: 11826, flow_bytes_toclient: 319526, flow_age: 53, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6650276, event_type: tls, proto: TCP, tls_session_resumed: True, tls_sni: st.ilfattoquotidiano.it, tls_version: TLS 1.2
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 18, flow_pkts_toclient: 19, flow_bytes_toserver: 2407, flow_bytes_toclient: 6552, flow_age: 66, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6652871, event_type: tls, proto: TCP, tls_subject: C=US, ST=Washington, L=Seattle, O=Amazon.com, Inc., CN=aax-us-east.amazon-adsystem.com, tls_issuerdn: C=US, O=Symantec Corporation, OU=Symantec Trust Network, CN=Symantec Class 3 Secure Server CA - G4, tls_serial: 66:A5:42:DB:E4:46:B6:F8:F8:D8:24:77:DC:6B:2B:76, tls_fingerprint: c5:74:fd:4c:5a:66:fc:b7:36:12:23:c7:c0:83:e4:72:c1:c6:60:92, tls_sni: aax.amazon-adsystem.com, tls_version: TLS 1.2, tls_notbefore: 2016-09-07T00:00:00, tls_notafter: 2017-10-06T23:59:59
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 14, flow_pkts_toclient: 17, flow_bytes_toserver: 3065, flow_bytes_toclient: 24732, flow_age: 54, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6653739, event_type: http, proto: TCP, tx_id: 0, http_hostname: www.today.com, http_url: /?_r=1, http_http_user_agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_5_8) AppleWebKit/534.50.2 (KHTML, like Gecko) Version/5.0.6 Safari/533.22.3, http_http_content_type: text/html, http_http_refer: http://www.today.com/?_r=1, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 18517 ; event_type: fileinfo, proto: TCP, http_hostname: www.today.com, http_url: /?_r=1, http_http_user_agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_5_8) AppleWebKit/534.50.2 (KHTML, like Gecko) Version/5.0.6 Safari/533.22.3, http_http_content_type: text/html, http_http_refer: http://www.today.com/?_r=1, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 18517, app_proto: http, fileinfo_filename: /, fileinfo_gaps: False, fileinfo_state: TRUNCATED, fileinfo_stored: False, fileinfo_size: 38243, fileinfo_tx_id: 0
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 13, flow_pkts_toclient: 8, flow_bytes_toserver: 1385, flow_bytes_toclient: 5721, flow_age: 1, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1f, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6653190, event_type: tls, proto: TCP, tls_session_resumed: True, tls_sni: auth.voxmedia.com, tls_version: TLS 1.2
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 152, flow_bytes_toclient: 266, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 6658921, event_type: dns, proto: UDP, dns_type: query, dns_id: 30980, dns_rrname: www.facebook.com, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 6658922, event_type: dns, proto: UDP, dns_type: query, dns_id: 30980, dns_rrname: www.facebook.com, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 6658998, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 30980, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.facebook.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: www.facebook.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 328, dns_answers_0_rdata: star-mini.c10r.facebook.com, dns_answers_1_rrname: star-mini.c10r.facebook.com, dns_answers_1_rrtype: AAAA, dns_answers_1_ttl: 6, dns_answers_1_rdata: 2a03:2880:f127:0083:face:b00c:0000:25de, dns_grouped_CNAME_0: star-mini.c10r.facebook.com, dns_grouped_AAAA_0: 2a03:2880:f127:0083:face:b00c:0000:25de ; pcap_cnt: 6658999, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 30980, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.facebook.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: www.facebook.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 328, dns_answers_0_rdata: star-mini.c10r.facebook.com, dns_answers_1_rrname: star-mini.c10r.facebook.com, dns_answers_1_rrtype: AAAA, dns_answers_1_ttl: 6, dns_answers_1_rdata: 2a03:2880:f127:0083:face:b00c:0000:25de, dns_grouped_AAAA_0: 2a03:2880:f127:0083:face:b00c:0000:25de, dns_grouped_CNAME_0: star-mini.c10r.facebook.com
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 170, flow_bytes_toclient: 288, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 6656156, event_type: dns, proto: UDP, dns_type: query, dns_id: 15917, dns_rrname: tpc.googlesyndication.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 6656157, event_type: dns, proto: UDP, dns_type: query, dns_id: 15917, dns_rrname: tpc.googlesyndication.com, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 6656158, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 15917, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: tpc.googlesyndication.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: tpc.googlesyndication.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 36228, dns_answers_0_rdata: pagead-googlehosted.l.google.com, dns_answers_1_rrname: pagead-googlehosted.l.google.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 13, dns_answers_1_rdata: 216.58.219.225, dns_grouped_A_0: 216.58.219.225, dns_grouped_CNAME_0: pagead-googlehosted.l.google.com ; pcap_cnt: 6656159, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 15917, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: tpc.googlesyndication.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: tpc.googlesyndication.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 36228, dns_answers_0_rdata: pagead-googlehosted.l.google.com, dns_answers_1_rrname: pagead-googlehosted.l.google.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 13, dns_answers_1_rdata: 216.58.219.225, dns_grouped_CNAME_0: pagead-googlehosted.l.google.com, dns_grouped_A_0: 216.58.219.225
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 89, flow_bytes_toclient: 121, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 6660192, event_type: dns, proto: UDP, dns_type: query, dns_id: 24276, dns_rrname: a1213.g.akamai.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 6660525, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 24276, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: a1213.g.akamai.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: a1213.g.akamai.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 19, dns_answers_0_rdata: 23.15.4.9, dns_answers_1_rrname: a1213.g.akamai.net, dns_answers_1_rrtype: A, dns_answers_1_ttl: 19, dns_answers_1_rdata: 23.15.4.8, dns_grouped_A_0: 23.15.4.9, dns_grouped_A_1: 23.15.4.8
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 154, flow_bytes_toclient: 242, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 6664663, event_type: dns, proto: UDP, dns_type: query, dns_id: 36254, dns_rrname: bidder.criteo.com, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 6664664, event_type: dns, proto: UDP, dns_type: query, dns_id: 36254, dns_rrname: bidder.criteo.com, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 6664689, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 36254, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: bidder.criteo.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: criteo.com, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 900, dns_authorities_0_soa_mname: ns1.criteo.com, dns_authorities_0_soa_rname: dns.criteo.com, dns_authorities_0_soa_serial: 2014061906, dns_authorities_0_soa_refresh: 10800, dns_authorities_0_soa_retry: 3600, dns_authorities_0_soa_expire: 2419200, dns_authorities_0_soa_minimum: 3600 ; pcap_cnt: 6664690, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 36254, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: bidder.criteo.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: criteo.com, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 900, dns_authorities_0_soa_mname: ns1.criteo.com, dns_authorities_0_soa_rname: dns.criteo.com, dns_authorities_0_soa_serial: 2014061906, dns_authorities_0_soa_refresh: 10800, dns_authorities_0_soa_retry: 3600, dns_authorities_0_soa_expire: 2419200, dns_authorities_0_soa_minimum: 3600
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 25, flow_pkts_toclient: 21, flow_bytes_toserver: 5816, flow_bytes_toclient: 6795, flow_age: 116, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6665276, event_type: tls, proto: TCP, tls_subject: C=US, ST=California, L=Playa Vista, O=The Rubicon Project, Inc., CN=*.rubiconproject.com, tls_issuerdn: C=US, O=DigiCert Inc, CN=DigiCert SHA2 Secure Server CA, tls_serial: 0D:B5:FD:B6:78:66:79:56:92:75:50:B9:87:91:89:F4, tls_fingerprint: 3b:3b:75:25:65:4a:a5:df:51:cd:cf:99:43:33:de:61:e5:df:55:b5, tls_sni: pixel.rubiconproject.com, tls_version: TLS 1.2, tls_notbefore: 2016-01-12T00:00:00, tls_notafter: 2019-03-01T12:00:00
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 12, flow_pkts_toclient: 7, flow_bytes_toserver: 1148, flow_bytes_toclient: 6279, flow_age: 6, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1f, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6669644, event_type: tls, proto: TCP, tls_session_resumed: True, tls_sni: pixel.condenastdigital.com, tls_version: TLS 1.2
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 15, flow_pkts_toclient: 14, flow_bytes_toserver: 1598, flow_bytes_toclient: 4798, flow_age: 62, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6669526, event_type: tls, proto: TCP, tls_session_resumed: True, tls_sni: responder.wt-safetag.com, tls_version: TLS 1.2
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 6, flow_pkts_toclient: 4, flow_bytes_toserver: 1333, flow_bytes_toclient: 1122, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6669545, event_type: http, proto: TCP, tx_id: 0, http_hostname: t.mookie1.com, http_url: /t/v1/event?migClientID=7901&migAction=internal&migXId=&migValue=0.00&migParam1=&migParam2=http%3A//www.today.com/%3F_r%3D1&migParam3=&migParam4=&migParam5=&migSource=mig&migRandom=0.6902341479435563, http_http_user_agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_5_8) AppleWebKit/534.50.2 (KHTML, like Gecko) Version/5.0.6 Safari/533.22.3, http_http_content_type: text/plain, http_http_refer: http://tags.tiqcdn.com/utag/xaxis/-nbc/prod/mobile.html?order_total=0.00&order_subtotal=0.00&lbData_MP1=&refAction=internal&lbRefEncoded=http%253A%2F%2Fwww.today.com%2F%253F_r%253D1&order_currency=USD&xaxis_title=Latest%20News%2C%20Videos%20%26%20Guest%20Interviews%20from%20the%20Today%20Show%20on%20NBC&xaxis_url=http%3A%2F%2Fwww.today.com%2F%3F_r%3D1&xaxis_domain=www.today.com&xaxis_pathname=%2F&xaxis_referrer=http%3A%2F%2Fwww.today.com%2F%3F_r%3D1, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 302, http_redirect: http://tlg.mookie1.com/t/v1/event?migClientID=7901&migAction=internal&migXId=&migValue=0.00&migParam1=&migParam2=http%3A//www.today.com/%3F_r%3D1&migParam3=&migParam4=&migParam5=&migSource=mig&migRandom=0.6902341479435563, http_length: 0
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 6, flow_pkts_toclient: 5, flow_bytes_toserver: 833, flow_bytes_toclient: 2605, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 13, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6675736, event_type: fileinfo, proto: TCP, http_hostname: ocsp.godaddy.com, http_url: /, http_http_user_agent: Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:54.0) Gecko/20100101 Firefox/54.0, http_http_method: POST, http_protocol: HTTP/1.1, http_length: 0, app_proto: http, fileinfo_filename: /, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 76, fileinfo_tx_id: 0 ; event_type: http, proto: TCP, tx_id: 0, http_hostname: ocsp.godaddy.com, http_url: /, http_http_user_agent: Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:54.0) Gecko/20100101 Firefox/54.0, http_http_method: POST, http_protocol: HTTP/1.1, http_length: 0
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 178, flow_bytes_toclient: 352, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 6677267, event_type: dns, proto: UDP, dns_type: query, dns_id: 47603, dns_rrname: d2tjil5tz17cbz.cloudfront.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 6677268, event_type: dns, proto: UDP, dns_type: query, dns_id: 47603, dns_rrname: d2tjil5tz17cbz.cloudfront.net, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 6677269, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 47603, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: d2tjil5tz17cbz.cloudfront.net, dns_rrtype: A, dns_rcode: NOERROR, dns_authorities_0_rrname: d2tjil5tz17cbz.cloudfront.net, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 205, dns_authorities_0_soa_mname: ns-1684.awsdns-18.co.uk, dns_authorities_0_soa_rname: awsdns-hostmaster.amazon.com, dns_authorities_0_soa_serial: 1, dns_authorities_0_soa_refresh: 7200, dns_authorities_0_soa_retry: 900, dns_authorities_0_soa_expire: 1209600, dns_authorities_0_soa_minimum: 86400 ; pcap_cnt: 6677270, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 47603, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: d2tjil5tz17cbz.cloudfront.net, dns_rrtype: A, dns_rcode: NOERROR, dns_authorities_0_rrname: d2tjil5tz17cbz.cloudfront.net, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 205, dns_authorities_0_soa_mname: ns-1684.awsdns-18.co.uk, dns_authorities_0_soa_rname: awsdns-hostmaster.amazon.com, dns_authorities_0_soa_serial: 1, dns_authorities_0_soa_refresh: 7200, dns_authorities_0_soa_retry: 900, dns_authorities_0_soa_expire: 1209600, dns_authorities_0_soa_minimum: 86400
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 17, flow_pkts_toclient: 12, flow_bytes_toserver: 3042, flow_bytes_toclient: 5652, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6678262, event_type: tls, proto: TCP, tls_subject: C=US, ST=California, L=Mountain View, O=Google Inc, CN=accounts.google.com, tls_issuerdn: C=US, O=Google Inc, CN=Google Internet Authority G2, tls_serial: 38:8A:75:BB:BE:8D:22:78, tls_fingerprint: 0d:f8:35:d2:0a:e1:83:18:2a:6c:92:f7:ec:01:df:42:23:aa:47:88, tls_sni: accounts.google.com, tls_version: TLSv1, tls_notbefore: 2017-06-21T14:32:00, tls_notafter: 2017-09-13T13:53:00
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 148, flow_bytes_toclient: 228, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 6684225, event_type: dns, proto: UDP, dns_type: query, dns_id: 29960, dns_rrname: v4.moatads.com, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 6684226, event_type: dns, proto: UDP, dns_type: query, dns_id: 29960, dns_rrname: v4.moatads.com, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 6684321, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 29960, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: v4.moatads.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: v4.moatads.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 303, dns_answers_0_rdata: pixel.moatads.com, dns_answers_1_rrname: pixel.moatads.com, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 159, dns_answers_1_rdata: pool5.moatads.com, dns_grouped_CNAME_0: pixel.moatads.com, dns_grouped_CNAME_1: pool5.moatads.com ; pcap_cnt: 6684322, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 29960, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: v4.moatads.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: v4.moatads.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 303, dns_answers_0_rdata: pixel.moatads.com, dns_answers_1_rrname: pixel.moatads.com, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 159, dns_answers_1_rdata: pool5.moatads.com, dns_grouped_CNAME_0: pixel.moatads.com, dns_grouped_CNAME_1: pool5.moatads.com
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 17, flow_pkts_toclient: 12, flow_bytes_toserver: 2313, flow_bytes_toclient: 5091, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1f, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 6684169, event_type: tls, proto: TCP, tls_subject: C=US, ST=California, L=Menlo Park, O=Facebook, Inc., CN=*.facebook.com, tls_issuerdn: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert SHA2 High Assurance Server CA, tls_serial: 02:2C:B1:14:84:9E:F3:20:78:8A:71:8B:35:91:73:5B, tls_fingerprint: 57:fa:8e:9b:76:a0:17:91:84:d5:b0:21:2b:bc:7f:2b:fa:c0:ca:f3, tls_sni: graph.facebook.com, tls_version: TLSv1, tls_notbefore: 2017-05-16T00:00:00, tls_notafter: 2018-06-22T12:00:00
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 170, flow_bytes_toclient: 226, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 6698228, event_type: dns, proto: UDP, dns_type: query, dns_id: 8769, dns_rrname: 3.10.168.192.in-addr.arpa, dns_rrtype: PTR, dns_tx_id: 0 ; pcap_cnt: 6698229, event_type: dns, proto: UDP, dns_type: query, dns_id: 8769, dns_rrname: 3.10.168.192.in-addr.arpa, dns_rrtype: PTR, dns_tx_id: 1 ; pcap_cnt: 6698230, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 8769, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: 3.10.168.192.in-addr.arpa, dns_rrtype: PTR, dns_rcode: NOERROR, dns_answers_0_rrname: 3.10.168.192.in-addr.arpa, dns_answers_0_rrtype: PTR, dns_answers_0_ttl: 1200, dns_answers_0_rdata: DC.Testbed1.ca, dns_grouped_PTR_0: DC.Testbed1.ca ; pcap_cnt: 6698231, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 8769, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: 3.10.168.192.in-addr.arpa, dns_rrtype: PTR, dns_rcode: NOERROR, dns_answers_0_rrname: 3.10.168.192.in-addr.arpa, dns_answers_0_rrtype: PTR, dns_answers_0_ttl: 1200, dns_answers_0_rdata: DC.Testbed1.ca, dns_grouped_PTR_0: DC.Testbed1.ca
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 17, flow_pkts_toclient: 14, flow_bytes_toserver: 2574, flow_bytes_toclient: 9875, flow_age: 54, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1f, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 152, flow_bytes_toclient: 266, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 6714107, event_type: dns, proto: UDP, dns_type: query, dns_id: 26892, dns_rrname: www.facebook.com, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 6714108, event_type: dns, proto: UDP, dns_type: query, dns_id: 26892, dns_rrname: www.facebook.com, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 6714367, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 26892, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.facebook.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: www.facebook.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 156, dns_answers_0_rdata: star-mini.c10r.facebook.com, dns_answers_1_rrname: star-mini.c10r.facebook.com, dns_answers_1_rrtype: AAAA, dns_answers_1_ttl: 17, dns_answers_1_rdata: 2a03:2880:f127:0083:face:b00c:0000:25de, dns_grouped_CNAME_0: star-mini.c10r.facebook.com, dns_grouped_AAAA_0: 2a03:2880:f127:0083:face:b00c:0000:25de ; pcap_cnt: 6714368, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 26892, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.facebook.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: www.facebook.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 156, dns_answers_0_rdata: star-mini.c10r.facebook.com, dns_answers_1_rrname: star-mini.c10r.facebook.com, dns_answers_1_rrtype: AAAA, dns_answers_1_ttl: 17, dns_answers_1_rdata: 2a03:2880:f127:0083:face:b00c:0000:25de, dns_grouped_CNAME_0: star-mini.c10r.facebook.com, dns_grouped_AAAA_0: 2a03:2880:f127:0083:face:b00c:0000:25de
| 0
|
BENIGN
|
Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.