Flow ID
stringlengths
32
44
event_types
sequencelengths
0
472
log_text
stringlengths
0
289k
alerted
bool
2 classes
Label
stringclasses
4 values
truth
bool
2 classes
start
stringlengths
15
15
age
int64
0
1,000k
Day
stringclasses
10 values
event_type_alert
listlengths
0
25
num_tokens
int64
0
138k
__index_level_0__
int64
0
1.96M
172.31.68.25-172.31.0.2-55216-53-17
[ "flow", "tls" ]
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 13, flow_pkts_toclient: 15, flow_bytes_toserver: 1301, flow_bytes_toclient: 6018, flow_age: 21, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: df, tcp_tcp_flags_ts: db, tcp_tcp_flags_tc: 1f, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_ecn: True, tcp_cwr: True, tcp_state: closed ; pcap_cnt: 2084035, event_type: tls, proto: TCP, tls_subject: OU=Domain Control Validated, CN=*.bootstrapcdn.com, tls_issuerdn: C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Domain Validation Secure Server CA, tls_serial: 00:E7:75:8C:F6:85:EB:4D:70:12:6C:8C:F4:3E:DD:9C:54, tls_fingerprint: f4:6b:17:fc:a1:dc:9a:9a:05:e4:ca:a5:bf:e7:51:07:57:c4:93:3d, tls_sni: maxcdn.bootstrapcdn.com, tls_version: TLS 1.2, tls_notbefore: 2017-10-03T00:00:00, tls_notafter: 2018-10-13T23:59:59
false
BENIGN
false
12:30:37.912194
1,494
Wednesday-14-02-2018
[]
416
1,652
172.31.68.25-172.31.0.2-61091-53-17
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 83, flow_bytes_toclient: 147, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2090294, event_type: dns, proto: UDP, dns_type: query, dns_id: 21092, dns_rrname: stats.l.doubleclick.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 2090295, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 21092, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: stats.l.doubleclick.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: stats.l.doubleclick.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 60, dns_answers_0_rdata: 209.85.202.154, dns_answers_1_rrname: stats.l.doubleclick.net, dns_answers_1_rrtype: A, dns_answers_1_ttl: 60, dns_answers_1_rdata: 209.85.202.155, dns_answers_2_rrname: stats.l.doubleclick.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 60, dns_answers_2_rdata: 209.85.202.156, dns_answers_3_rrname: stats.l.doubleclick.net, dns_answers_3_rrtype: A, dns_answers_3_ttl: 60, dns_answers_3_rdata: 209.85.202.157, dns_grouped_A_0: 209.85.202.154, dns_grouped_A_1: 209.85.202.155, dns_grouped_A_2: 209.85.202.156, dns_grouped_A_3: 209.85.202.157
false
BENIGN
false
12:30:37.912736
25,108
Wednesday-14-02-2018
[]
600
1,653
172.31.68.25-172.31.0.2-63653-53-17
[ "flow", "dns", "dns", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 170, flow_bytes_toclient: 278, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2086067, event_type: dns, proto: UDP, dns_type: query, dns_id: 36013, dns_rrname: ade.googlesyndication.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 2086074, event_type: dns, proto: UDP, dns_type: query, dns_id: 36013, dns_rrname: ade.googlesyndication.com, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 2086083, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 36013, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: ade.googlesyndication.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: ade.googlesyndication.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 60, dns_answers_0_rdata: pagead.l.doubleclick.net, dns_answers_1_rrname: pagead.l.doubleclick.net, dns_answers_1_rrtype: A, dns_answers_1_ttl: 58, dns_answers_1_rdata: 216.58.211.162, dns_grouped_A_0: 216.58.211.162, dns_grouped_CNAME_0: pagead.l.doubleclick.net ; pcap_cnt: 2086084, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 36013, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: ade.googlesyndication.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: ade.googlesyndication.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 60, dns_answers_0_rdata: pagead.l.doubleclick.net, dns_answers_1_rrname: pagead.l.doubleclick.net, dns_answers_1_rrtype: A, dns_answers_1_ttl: 58, dns_answers_1_rdata: 216.58.211.162, dns_grouped_A_0: 216.58.211.162, dns_grouped_CNAME_0: pagead.l.doubleclick.net
false
BENIGN
false
12:30:37.916881
440
Wednesday-14-02-2018
[]
805
1,654
172.31.68.25-172.31.0.2-50058-53-17
[ "flow" ]
event_type: flow, proto: TCP, flow_pkts_toserver: 1, flow_pkts_toclient: 0, flow_bytes_toserver: 66, flow_bytes_toclient: 0, flow_age: 0, flow_state: new, flow_reason: timeout, tcp_tcp_flags: c2, tcp_tcp_flags_ts: c2, tcp_tcp_flags_tc: 00, tcp_syn: True, tcp_ecn: True, tcp_cwr: True, tcp_state: syn_sent
false
BENIGN
false
12:30:37.917612
1,304
Wednesday-14-02-2018
[]
132
1,655
172.31.68.25-172.31.0.2-52481-53-17
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 81, flow_bytes_toclient: 137, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2082565, event_type: dns, proto: UDP, dns_type: query, dns_id: 57355, dns_rrname: s.gycs.b.yahoodns.net, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 2082583, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 57355, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: s.gycs.b.yahoodns.net, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: s.gycs.b.yahoodns.net, dns_answers_0_rrtype: AAAA, dns_answers_0_ttl: 60, dns_answers_0_rdata: 2001:4998:0014:0800:0000:0000:0000:1001, dns_answers_1_rrname: s.gycs.b.yahoodns.net, dns_answers_1_rrtype: AAAA, dns_answers_1_ttl: 60, dns_answers_1_rdata: 2001:4998:0014:0800:0000:0000:0000:1000, dns_grouped_AAAA_0: 2001:4998:0014:0800:0000:0000:0000:1001, dns_grouped_AAAA_1: 2001:4998:0014:0800:0000:0000:0000:1000
false
BENIGN
false
12:30:37.929300
552
Wednesday-14-02-2018
[]
490
1,656
172.31.68.25-172.31.0.2-58835-53-17
[ "flow", "dns", "dns", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 154, flow_bytes_toclient: 186, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2082334, event_type: dns, proto: UDP, dns_type: query, dns_id: 4608, dns_rrname: play.l.google.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 2082335, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 4608, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: play.l.google.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: play.l.google.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 22, dns_answers_0_rdata: 172.217.8.14, dns_grouped_A_0: 172.217.8.14 ; pcap_cnt: 2082350, event_type: dns, proto: UDP, dns_type: query, dns_id: 4608, dns_rrname: play.l.google.com, dns_rrtype: A, dns_tx_id: 2 ; pcap_cnt: 2082354, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 4608, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: play.l.google.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: play.l.google.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 22, dns_answers_0_rdata: 172.217.8.14, dns_grouped_A_0: 172.217.8.14
false
BENIGN
false
12:30:37.950165
26,956
Wednesday-14-02-2018
[]
593
1,658
172.31.67.108-172.31.0.2-55796-53-17
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 84, flow_bytes_toclient: 197, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 139, event_type: dns, proto: UDP, dns_type: query, dns_id: 25161, dns_rrname: detectportal.firefox.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 140, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 25161, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: detectportal.firefox.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: detectportal.firefox.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 29, dns_answers_0_rdata: detectportal.firefox.com.edgesuite.net, dns_answers_1_rrname: detectportal.firefox.com.edgesuite.net, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 60, dns_answers_1_rdata: a1089.d.akamai.net, dns_answers_2_rrname: a1089.d.akamai.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 3, dns_answers_2_rdata: 23.219.88.145, dns_answers_3_rrname: a1089.d.akamai.net, dns_answers_3_rrtype: A, dns_answers_3_ttl: 3, dns_answers_3_rdata: 23.219.88.153, dns_grouped_A_0: 23.219.88.145, dns_grouped_A_1: 23.219.88.153, dns_grouped_CNAME_0: detectportal.firefox.com.edgesuite.net, dns_grouped_CNAME_1: a1089.d.akamai.net
false
BENIGN
false
12:30:38.131966
8,950
Wednesday-14-02-2018
[]
637
1,659
172.31.68.25-172.31.0.2-50810-53-17
[ "flow", "dns", "dns", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 174, flow_bytes_toclient: 410, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2085395, event_type: dns, proto: UDP, dns_type: query, dns_id: 42657, dns_rrname: ocsp.int-x3.letsencrypt.org, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 2085403, event_type: dns, proto: UDP, dns_type: query, dns_id: 42657, dns_rrname: ocsp.int-x3.letsencrypt.org, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 2085406, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 42657, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: ocsp.int-x3.letsencrypt.org, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: ocsp.int-x3.letsencrypt.org, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 60, dns_answers_0_rdata: ocsp.int-x3.letsencrypt.org.edgesuite.net, dns_answers_1_rrname: ocsp.int-x3.letsencrypt.org.edgesuite.net, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 60, dns_answers_1_rdata: a771.dscq.akamai.net, dns_answers_2_rrname: a771.dscq.akamai.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 20, dns_answers_2_rdata: 23.62.6.10, dns_answers_3_rrname: a771.dscq.akamai.net, dns_answers_3_rrtype: A, dns_answers_3_ttl: 20, dns_answers_3_rdata: 23.62.6.26, dns_grouped_A_0: 23.62.6.10, dns_grouped_A_1: 23.62.6.26, dns_grouped_CNAME_0: ocsp.int-x3.letsencrypt.org.edgesuite.net, dns_grouped_CNAME_1: a771.dscq.akamai.net ; pcap_cnt: 2085407, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 42657, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: ocsp.int-x3.letsencrypt.org, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: ocsp.int-x3.letsencrypt.org, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 60, dns_answers_0_rdata: ocsp.int-x3.letsencrypt.org.edgesuite.net, dns_answers_1_rrname: ocsp.int-x3.letsencrypt.org.edgesuite.net, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 60, dns_answers_1_rdata: a771.dscq.akamai.net, dns_answers_2_rrname: a771.dscq.akamai.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 20, dns_answers_2_rdata: 23.62.6.10, dns_answers_3_rrname: a771.dscq.akamai.net, dns_answers_3_rrtype: A, dns_answers_3_ttl: 20, dns_answers_3_rdata: 23.62.6.26, dns_grouped_CNAME_0: ocsp.int-x3.letsencrypt.org.edgesuite.net, dns_grouped_CNAME_1: a771.dscq.akamai.net, dns_grouped_A_0: 23.62.6.10, dns_grouped_A_1: 23.62.6.26
false
BENIGN
false
12:30:38.154253
14,323
Wednesday-14-02-2018
[]
1,283
1,660
172.31.67.108-172.31.0.2-49663-53-17
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 74, flow_bytes_toclient: 90, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 143, event_type: dns, proto: UDP, dns_type: query, dns_id: 22991, dns_rrname: www.rovell.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 161, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 22991, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.rovell.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: www.rovell.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 60, dns_answers_0_rdata: 69.49.101.57, dns_grouped_A_0: 69.49.101.57
false
BENIGN
false
12:30:38.291392
51,386
Wednesday-14-02-2018
[]
329
1,661
172.31.67.108-172.31.0.2-51494-53-17
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 85, flow_bytes_toclient: 141, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 144, event_type: dns, proto: UDP, dns_type: query, dns_id: 17292, dns_rrname: getpocket.cdn.mozilla.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 145, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 17292, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: getpocket.cdn.mozilla.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: getpocket.cdn.mozilla.net, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 55, dns_answers_0_rdata: getpocket-cdn.prod.mozaws.net, dns_answers_1_rrname: getpocket-cdn.prod.mozaws.net, dns_answers_1_rrtype: A, dns_answers_1_ttl: 34, dns_answers_1_rdata: 52.84.122.201, dns_grouped_CNAME_0: getpocket-cdn.prod.mozaws.net, dns_grouped_A_0: 52.84.122.201
false
BENIGN
false
12:30:38.291816
1,558
Wednesday-14-02-2018
[]
444
1,662
172.31.67.108-172.31.0.2-60009-53-17
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 78, flow_bytes_toclient: 110, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 146, event_type: dns, proto: UDP, dns_type: query, dns_id: 43294, dns_rrname: a1089.d.akamai.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 148, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 43294, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: a1089.d.akamai.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: a1089.d.akamai.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 3, dns_answers_0_rdata: 23.219.88.153, dns_answers_1_rrname: a1089.d.akamai.net, dns_answers_1_rrtype: A, dns_answers_1_ttl: 3, dns_answers_1_rdata: 23.219.88.145, dns_grouped_A_0: 23.219.88.153, dns_grouped_A_1: 23.219.88.145
false
BENIGN
false
12:30:38.314883
3,862
Wednesday-14-02-2018
[]
434
1,663
172.31.67.108-172.31.0.2-60549-53-17
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 89, flow_bytes_toclient: 105, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 149, event_type: dns, proto: UDP, dns_type: query, dns_id: 38648, dns_rrname: getpocket-cdn.prod.mozaws.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 150, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 38648, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: getpocket-cdn.prod.mozaws.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: getpocket-cdn.prod.mozaws.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 34, dns_answers_0_rdata: 52.84.122.201, dns_grouped_A_0: 52.84.122.201
false
BENIGN
false
12:30:38.318925
295
Wednesday-14-02-2018
[]
350
1,664
172.31.67.108-172.31.0.2-56002-53-17
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 78, flow_bytes_toclient: 139, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 159, event_type: dns, proto: UDP, dns_type: query, dns_id: 46077, dns_rrname: a1089.d.akamai.net, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 160, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 46077, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: a1089.d.akamai.net, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: d.akamai.net, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 60, dns_authorities_0_soa_mname: n0d.akamai.net, dns_authorities_0_soa_rname: hostmaster.akamai.com, dns_authorities_0_soa_serial: 1518611431, dns_authorities_0_soa_refresh: 1000, dns_authorities_0_soa_retry: 1000, dns_authorities_0_soa_expire: 1000, dns_authorities_0_soa_minimum: 1800
false
BENIGN
false
12:30:38.341346
1,040
Wednesday-14-02-2018
[]
430
1,665
172.31.67.108-172.31.0.2-60760-53-17
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 89, flow_bytes_toclient: 174, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 164, event_type: dns, proto: UDP, dns_type: query, dns_id: 38348, dns_rrname: getpocket-cdn.prod.mozaws.net, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 174, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 38348, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: getpocket-cdn.prod.mozaws.net, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: prod.mozaws.net, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 60, dns_authorities_0_soa_mname: ns-1260.awsdns-29.org, dns_authorities_0_soa_rname: awsdns-hostmaster.amazon.com, dns_authorities_0_soa_serial: 1, dns_authorities_0_soa_refresh: 7200, dns_authorities_0_soa_retry: 900, dns_authorities_0_soa_expire: 1209600, dns_authorities_0_soa_minimum: 86400
false
BENIGN
false
12:30:38.349116
1,321
Wednesday-14-02-2018
[]
441
1,666
172.31.67.108-172.31.0.2-58083-53-17
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 74, flow_bytes_toclient: 90, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 169, event_type: dns, proto: UDP, dns_type: query, dns_id: 47051, dns_rrname: www.rovell.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 177, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 47051, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.rovell.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: www.rovell.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 60, dns_answers_0_rdata: 69.49.101.57, dns_grouped_A_0: 69.49.101.57
false
BENIGN
false
12:30:38.350098
459
Wednesday-14-02-2018
[]
329
1,667
172.31.68.25-172.31.0.2-57890-53-17
[ "dns", "dns" ]
pcap_cnt: 2082968, event_type: dns, proto: UDP, dns_type: query, dns_id: 40519, dns_rrname: www.mozilla.org, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 2082969, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 40519, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.mozilla.org, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: www.mozilla.org, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 25, dns_answers_0_rdata: www.mozilla.org.cdn.cloudflare.net, dns_answers_1_rrname: www.mozilla.org.cdn.cloudflare.net, dns_answers_1_rrtype: A, dns_answers_1_ttl: 6, dns_answers_1_rdata: 104.16.41.2, dns_answers_2_rrname: www.mozilla.org.cdn.cloudflare.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 6, dns_answers_2_rdata: 104.16.40.2, dns_grouped_CNAME_0: www.mozilla.org.cdn.cloudflare.net, dns_grouped_A_0: 104.16.41.2, dns_grouped_A_1: 104.16.40.2
null
BENIGN
false
12:30:38.356012
2,464
Wednesday-14-02-2018
[]
455
1,668
172.31.65.124-23.36.32.235-49497-443-6
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 79, flow_bytes_toclient: 134, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 4002748, event_type: dns, proto: UDP, dns_type: query, dns_id: 24338, dns_rrname: px.ads.linkedin.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 4002749, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 24338, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: px.ads.linkedin.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: px.ads.linkedin.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 60, dns_answers_0_rdata: mix.linkedin.com, dns_answers_1_rrname: mix.linkedin.com, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 60, dns_answers_1_rdata: any-na.mix.linkedin.com, dns_answers_2_rrname: any-na.mix.linkedin.com, dns_answers_2_rrtype: A, dns_answers_2_ttl: 60, dns_answers_2_rdata: 108.174.10.14, dns_grouped_CNAME_0: mix.linkedin.com, dns_grouped_CNAME_1: any-na.mix.linkedin.com, dns_grouped_A_0: 108.174.10.14
false
BENIGN
false
12:30:38.356723
244,791
Wednesday-14-02-2018
[]
524
1,669
172.31.67.108-172.31.0.2-49617-53-17
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 74, flow_bytes_toclient: 142, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 178, event_type: dns, proto: UDP, dns_type: query, dns_id: 38380, dns_rrname: www.rovell.com, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 186, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 38380, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.rovell.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: rovell.com, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 60, dns_authorities_0_soa_mname: dns1.datacentres.rogers.com, dns_authorities_0_soa_rname: support.datacentres.rogers.com, dns_authorities_0_soa_serial: 2016062752, dns_authorities_0_soa_refresh: 10800, dns_authorities_0_soa_retry: 3600, dns_authorities_0_soa_expire: 604800, dns_authorities_0_soa_minimum: 86400
false
BENIGN
false
12:30:38.377828
35,885
Wednesday-14-02-2018
[]
428
1,670
172.31.68.25-172.31.0.2-56661-53-17
[ "flow", "tls" ]
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 14, flow_pkts_toclient: 18, flow_bytes_toserver: 2606, flow_bytes_toclient: 4428, flow_age: 35, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: df, tcp_tcp_flags_ts: db, tcp_tcp_flags_tc: 5f, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_ecn: True, tcp_cwr: True, tcp_state: closed ; pcap_cnt: 2086088, event_type: tls, proto: TCP, tls_subject: C=US, ST=California, L=Mountain View, O=LinkedIn Corporation, CN=px.ads.linkedin.com, tls_issuerdn: C=US, O=DigiCert Inc, CN=DigiCert SHA2 Secure Server CA, tls_serial: 08:F3:94:3D:25:5E:C3:9A:B7:15:A3:12:A3:38:6D:52, tls_fingerprint: 0a:ac:ef:eb:1d:3d:19:60:6d:ca:70:09:74:cf:aa:e5:97:59:79:e9, tls_sni: px.ads.linkedin.com, tls_version: TLS 1.2, tls_notbefore: 2017-06-06T00:00:00, tls_notafter: 2019-06-11T12:00:00
false
BENIGN
false
12:30:38.460289
644
Wednesday-14-02-2018
[]
410
1,673
172.31.68.25-172.31.0.2-63001-53-17
[ "flow", "tls" ]
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 10, flow_pkts_toclient: 9, flow_bytes_toserver: 1133, flow_bytes_toclient: 4370, flow_age: 1, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: df, tcp_tcp_flags_ts: df, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_ecn: True, tcp_cwr: True, tcp_state: last_ack ; pcap_cnt: 2090031, event_type: tls, proto: TCP, tls_subject: CN=www.hotspotshield.com, tls_issuerdn: C=US, O=Let's Encrypt, CN=Let's Encrypt Authority X3, tls_serial: 03:64:31:8D:83:22:D7:DB:70:0D:41:90:31:C4:02:82:55:DC, tls_fingerprint: 92:c4:43:46:ba:c1:d1:a2:aa:83:e3:08:c0:9d:b9:c4:c2:d7:c9:38, tls_sni: www.hotspotshield.com, tls_version: TLS 1.2, tls_notbefore: 2018-02-12T07:01:36, tls_notafter: 2018-05-13T07:01:36
false
BENIGN
false
12:30:38.471850
18,372
Wednesday-14-02-2018
[]
394
1,674
172.31.68.25-172.31.0.2-57682-53-17
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 83, flow_bytes_toclient: 111, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2086005, event_type: dns, proto: UDP, dns_type: query, dns_id: 25190, dns_rrname: any-na.mix.linkedin.com, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 2086028, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 25190, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: any-na.mix.linkedin.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: any-na.mix.linkedin.com, dns_answers_0_rrtype: AAAA, dns_answers_0_ttl: 60, dns_answers_0_rdata: 2620:0109:c002:0000:0000:0000:6cae:0a0e, dns_grouped_AAAA_0: 2620:0109:c002:0000:0000:0000:6cae:0a0e
false
BENIGN
false
12:30:38.474447
196,487
Wednesday-14-02-2018
[]
380
1,675
172.31.68.25-172.31.0.2-57039-53-17
[ "flow", "dns", "dns", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 178, flow_bytes_toclient: 210, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2095617, event_type: dns, proto: UDP, dns_type: query, dns_id: 2172, dns_rrname: getpocket-cdn.prod.mozaws.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 2095618, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 2172, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: getpocket-cdn.prod.mozaws.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: getpocket-cdn.prod.mozaws.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 59, dns_answers_0_rdata: 13.33.140.103, dns_grouped_A_0: 13.33.140.103 ; pcap_cnt: 2095634, event_type: dns, proto: UDP, dns_type: query, dns_id: 2172, dns_rrname: getpocket-cdn.prod.mozaws.net, dns_rrtype: A, dns_tx_id: 2 ; pcap_cnt: 2095636, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 2172, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: getpocket-cdn.prod.mozaws.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: getpocket-cdn.prod.mozaws.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 59, dns_answers_0_rdata: 13.33.140.103, dns_grouped_A_0: 13.33.140.103
false
BENIGN
false
12:30:38.474874
1,104
Wednesday-14-02-2018
[]
629
1,676
172.31.68.25-172.31.0.2-63681-53-17
[ "rdp", "rdp" ]
pcap_cnt: 2088940, event_type: rdp, proto: TCP, rdp_tx_id: 0, rdp_event_type: initial_request, rdp_cookie: Administr ; pcap_cnt: 2088941, event_type: rdp, proto: TCP, rdp_tx_id: 1, rdp_event_type: initial_response, rdp_server_supports_0: extended_client_data, rdp_server_supports_1: dynvc_gfx, rdp_server_supports_2: restricted_admin, rdp_server_supports_3: redirected_authentication, rdp_protocol: hybrid
null
BENIGN
false
12:30:38.532644
528
Wednesday-14-02-2018
[ { "alert": { "action": "allowed", "category": "Generic Protocol Command Decode", "gid": 1, "metadata": { "affected_product": null, "attack_target": null, "confidence": null, "created_at": [ "2011_04_22" ], "cve": null, "deployment": null, "former_category": null, "malware_family": null, "performance_impact": null, "reviewed_at": null, "signature_severity": null, "tag": null, "updated_at": [ "2011_04_22" ] }, "rev": 5, "severity": 3, "signature": "ET POLICY MS Remote Desktop Administrator Login Request", "signature_id": 2012709, "source": null, "target": null }, "app_proto": null, "dest_ip": "172.31.65.39", "dest_port": 3389, "dns": null, "ether": { "dest_mac": "02:73:b2:12:a2:c4", "src_mac": "02:3f:d5:42:27:3c" }, "event_type": "alert", "files": null, "flow": { "bytes_toclient": 66, "bytes_toserver": 221, "pkts_toclient": 1, "pkts_toserver": 3, "start": "2018-02-14T16:11:03.578664+0000" }, "flow_id": 264206516999272, "http": null, "metadata": null, "packet": "AnOyEqLEAj/VQic8CABFAgBXddNAAGwGCS9NSFUOrB9BJx93DT2a7bRmr7xqVVAYAQA8wQAAAwAALyrgAAAAAABDb29raWU6IG1zdHNoYXNoPUFkbWluaXN0cg0KAQAIAAMAAAA=", "packet_info": { "linktype": 1 }, "payload": "AwAALyrgAAAAAABDb29raWU6IG1zdHNoYXNoPUFkbWluaXN0cg0KAQAIAAMAAAA=", "payload_printable": ".../*......Cookie: mstshash=Administr\r\n........", "pcap_cnt": 2088939, "proto": "TCP", "rdp": null, "sip": null, "smb": null, "snmp": null, "src_ip": "77.72.85.14", "src_port": 8055, "ssh": null, "stream": 0, "timestamp": "2018-02-14T16:11:03.970136+0000", "tx_id": null }, { "alert": { "action": "allowed", "category": "Misc activity", "gid": 1, "metadata": { "affected_product": null, "attack_target": [ "Client_and_Server" ], "confidence": [ "Medium" ], "created_at": [ "2010_07_30" ], "cve": null, "deployment": [ "Perimeter" ], "former_category": [ "INFO" ], "malware_family": null, "performance_impact": [ "Significant" ], "reviewed_at": null, "signature_severity": [ "Informational" ], "tag": null, "updated_at": [ "2023_04_25" ] }, "rev": 10, "severity": 3, "signature": "ET INFO RDP - Response To External Host", "signature_id": 2001330, "source": { "ip": "77.72.85.14", "port": 8055 }, "target": { "ip": "172.31.65.39", "port": 3389 } }, "app_proto": "rdp", "dest_ip": "77.72.85.14", "dest_port": 8055, "dns": null, "ether": { "dest_mac": "02:3f:d5:42:27:3c", "src_mac": "02:73:b2:12:a2:c4" }, "event_type": "alert", "files": null, "flow": { "bytes_toclient": 139, "bytes_toserver": 221, "pkts_toclient": 2, "pkts_toserver": 3, "start": "2018-02-14T16:11:03.578664+0000" }, "flow_id": 264206516999272, "http": null, "metadata": null, "packet": "Aj/VQic8AnOyEqLECABFAgA7PGpAAIAGAACsH0EnTUhVDg09H3evvGpVmu20lVAY+dGPygAAAwAAEw7QAAASNAACHwgAAgAAAA==", "packet_info": { "linktype": 1 }, "payload": "AwAAEw7QAAASNAACHwgAAgAAAA==", "payload_printable": ".........4.........", "pcap_cnt": 2088940, "proto": "TCP", "rdp": { "cookie": "Administr", "event_type": "initial_request", "protocol": null, "server_supports": null, "tx_id": 0 }, "sip": null, "smb": null, "snmp": null, "src_ip": "172.31.65.39", "src_port": 3389, "ssh": null, "stream": 0, "timestamp": "2018-02-14T16:11:03.973065+0000", "tx_id": null }, { "alert": { "action": "allowed", "category": "Generic Protocol Command Decode", "gid": 1, "metadata": { "affected_product": null, "attack_target": null, "confidence": null, "created_at": [ "2011_04_22" ], "cve": null, "deployment": null, "former_category": null, "malware_family": null, "performance_impact": null, "reviewed_at": null, "signature_severity": null, "tag": null, "updated_at": [ "2011_04_22" ] }, "rev": 5, "severity": 3, "signature": "ET POLICY MS Remote Desktop Administrator Login Request", "signature_id": 2012709, "source": null, "target": null }, "app_proto": "rdp", "dest_ip": "172.31.65.39", "dest_port": 3389, "dns": null, "ether": { "dest_mac": "02:73:b2:12:a2:c4", "src_mac": "02:3f:d5:42:27:3c" }, "event_type": "alert", "files": null, "flow": { "bytes_toclient": 836, "bytes_toserver": 2228, "pkts_toclient": 8, "pkts_toserver": 15, "start": "2018-02-14T16:11:03.578664+0000" }, "flow_id": 264206516999272, "http": null, "metadata": null, "packet": "AnOyEqLEAj/VQic8CABFAAAodlVAAGwGCN5NSFUOrB9BJx93DT2a7bnkr7xzOVARAP96uwAA", "packet_info": { "linktype": 1 }, "payload": "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", "payload_printable": ".../*......Cookie: mstshash=Administr\r\n...................Z._.pb.F A..a.3MQ....t..6.mX...Z..4.(.'.........9.3.....=.<.5./.,.+.$.#.\[email protected].\n.....5.\n...............\r.......................#......................?...D.J.........n...+..6.x.d..J1tT8-.,...t{o.d....\"y...R&).m...n.....\r...H.G.q....&.r....h... ...-087.Z~...\r...dN.....JS....D...W.../[email protected]..\\...R.Mb\\.K..V.f[..cI.C..xTc_M...KC.,..kZ.^[b..x...........*....;..~..=...fai.u....Y7.........O.....;. ............(..........x.\"..l..N._.qf..i..>J..Al.........Q........x.^.v/..<..!..U......Ni....i.p.}s...V.=.\r.1@67'.t....X.KH......v..\[email protected]...../M.60..\"X....Pq.)[email protected]<{.............>\"...n......\n...Y......s`....C........r.....*..9].*...:..F4N.b...*.K.F...J...4%\\[....?78eY.\n-..r>Zxs..|dXqx.F..=...a.}..p.6|{.......u..).(...P^...i...w\nr...%...7.^...>m.m..&I.)o,..).}Y.......1.hwx...2..m..........\r..$.v....>WK..R.<t.\n.I.j\n2...w.;.6.ms..?Fi..;h..-9\"~....V...=...-...t...i....KE*)...`..9...:d....N4]..r.qPN..f...D.+..#....n.=...9yu6A.a...|B.....~...6u\\c...YZ{../.....:@C..vx..X..#FSF.3.ZJF.....=p..k......8.`..Hq.%..\n......c..xT.....\"i.\\..Q...GE........?..U..oN.9..YE...pv4.+.'...i..H..7if.S......p..?...&.S..z a\"#...7s.y.B.......W...(...z..8....H.....6P.C....\\.!o.../.....=.........t! I.%[email protected]...:.G........!.........qk#6..5...<[email protected]", "pcap_cnt": 2088959, "proto": "TCP", "rdp": null, "sip": null, "smb": null, "snmp": null, "src_ip": "77.72.85.14", "src_port": 8055, "ssh": null, "stream": 1, "timestamp": "2018-02-14T16:11:07.933662+0000", "tx_id": null }, { "alert": { "action": "allowed", "category": "Misc activity", "gid": 1, "metadata": { "affected_product": null, "attack_target": [ "Client_and_Server" ], "confidence": [ "Medium" ], "created_at": [ "2010_07_30" ], "cve": null, "deployment": [ "Perimeter" ], "former_category": [ "INFO" ], "malware_family": null, "performance_impact": [ "Significant" ], "reviewed_at": null, "signature_severity": [ "Informational" ], "tag": null, "updated_at": [ "2023_04_25" ] }, "rev": 10, "severity": 3, "signature": "ET INFO RDP - Response To External Host", "signature_id": 2001330, "source": { "ip": "77.72.85.14", "port": 8055 }, "target": { "ip": "172.31.65.39", "port": 3389 } }, "app_proto": "rdp", "dest_ip": "77.72.85.14", "dest_port": 8055, "dns": null, "ether": { "dest_mac": "02:3f:d5:42:27:3c", "src_mac": "02:73:b2:12:a2:c4" }, "event_type": "alert", "files": null, "flow": { "bytes_toclient": 890, "bytes_toserver": 2228, "pkts_toclient": 9, "pkts_toserver": 15, "start": "2018-02-14T16:11:03.578664+0000" }, "flow_id": 264206516999272, "http": null, "metadata": null, "packet": "Aj/VQic8AnOyEqLECABFAAAoPHNAAIAGAACsH0EnTUhVDg09H3evvHM5mu255VAQ9IKPtwAA", "packet_info": { "linktype": 1 }, "payload": "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", "payload_printable": ".........4...................(..........O..P......q....gp\r..X.B....A;P................%..ER.4%B....-....l.l.pJaV..;[email protected]{....i..]q..%.&.nm......y.....631...U+.,.....m........+Y.dC.p7}...45..p.P.-.{.s...s.i..v..j...T............{..j.I.kAx.J.......0.C....R.lV.]D...!j..U..7Y|;.b.......[..j)....F\\..V....I.....r.2..................?.h...A./)..A", "pcap_cnt": 2088960, "proto": "TCP", "rdp": null, "sip": null, "smb": null, "snmp": null, "src_ip": "172.31.65.39", "src_port": 3389, "ssh": null, "stream": 1, "timestamp": "2018-02-14T16:11:07.933696+0000", "tx_id": null } ]
158
1,677
172.31.68.25-172.31.0.2-62389-53-17
[ "dns", "dns", "dns", "dns" ]
pcap_cnt: 2082925, event_type: dns, proto: UDP, dns_type: query, dns_id: 43567, dns_rrname: www.wish.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 2082965, event_type: dns, proto: UDP, dns_type: query, dns_id: 43567, dns_rrname: www.wish.com, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 2083005, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 43567, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.wish.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: www.wish.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 60, dns_answers_0_rdata: wish.com, dns_answers_1_rrname: wish.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 1, dns_answers_1_rdata: 52.52.131.222, dns_grouped_CNAME_0: wish.com, dns_grouped_A_0: 52.52.131.222 ; pcap_cnt: 2083006, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 43567, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.wish.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: www.wish.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 60, dns_answers_0_rdata: wish.com, dns_answers_1_rrname: wish.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 1, dns_answers_1_rdata: 52.52.131.222, dns_grouped_CNAME_0: wish.com, dns_grouped_A_0: 52.52.131.222
null
BENIGN
false
12:30:38.533137
1,603
Wednesday-14-02-2018
[]
659
1,678
172.31.68.25-172.31.0.2-53568-53-17
[ "rdp", "rdp" ]
pcap_cnt: 2091478, event_type: rdp, proto: TCP, rdp_tx_id: 0, rdp_event_type: initial_request, rdp_cookie: Administr ; pcap_cnt: 2091479, event_type: rdp, proto: TCP, rdp_tx_id: 1, rdp_event_type: initial_response, rdp_server_supports_0: extended_client_data, rdp_server_supports_1: dynvc_gfx, rdp_server_supports_2: restricted_admin, rdp_server_supports_3: redirected_authentication, rdp_protocol: hybrid
null
BENIGN
false
12:30:38.534721
23,623
Wednesday-14-02-2018
[ { "alert": { "action": "allowed", "category": "Detection of a Network Scan", "gid": 1, "metadata": { "affected_product": null, "attack_target": null, "confidence": null, "created_at": [ "2010_07_30" ], "cve": null, "deployment": null, "former_category": [ "SCAN" ], "malware_family": null, "performance_impact": null, "reviewed_at": null, "signature_severity": null, "tag": null, "updated_at": [ "2023_11_14" ] }, "rev": 21, "severity": 3, "signature": "ET SCAN Behavioral Unusually fast Terminal Server Traffic Potential Scan or Infection (Inbound)", "signature_id": 2001972, "source": null, "target": null }, "app_proto": null, "dest_ip": "172.31.65.39", "dest_port": 3389, "dns": null, "ether": { "dest_mac": "02:73:b2:12:a2:c4", "src_mac": "02:3f:d5:42:27:3c" }, "event_type": "alert", "files": null, "flow": { "bytes_toclient": 0, "bytes_toserver": 66, "pkts_toclient": 0, "pkts_toserver": 1, "start": "2018-02-14T16:15:48.029100+0000" }, "flow_id": 1001826366550444, "http": null, "metadata": null, "packet": "AnOyEqLEAj/VQic8CABFAgA0DVdAAGwGcc5NSFUOrB9BJ1jDDT3tGR1KAAAAAIDCIABOTwAAAgQFtAEDAwgBAQQC", "packet_info": { "linktype": 1 }, "payload": "", "payload_printable": "", "pcap_cnt": 2091472, "proto": "TCP", "rdp": null, "sip": null, "smb": null, "snmp": null, "src_ip": "77.72.85.14", "src_port": 22723, "ssh": null, "stream": 0, "timestamp": "2018-02-14T16:15:48.029100+0000", "tx_id": null }, { "alert": { "action": "allowed", "category": "Generic Protocol Command Decode", "gid": 1, "metadata": { "affected_product": null, "attack_target": null, "confidence": null, "created_at": [ "2011_04_22" ], "cve": null, "deployment": null, "former_category": null, "malware_family": null, "performance_impact": null, "reviewed_at": null, "signature_severity": null, "tag": null, "updated_at": [ "2011_04_22" ] }, "rev": 5, "severity": 3, "signature": "ET POLICY MS Remote Desktop Administrator Login Request", "signature_id": 2012709, "source": null, "target": null }, "app_proto": null, "dest_ip": "172.31.65.39", "dest_port": 3389, "dns": null, "ether": { "dest_mac": "02:73:b2:12:a2:c4", "src_mac": "02:3f:d5:42:27:3c" }, "event_type": "alert", "files": null, "flow": { "bytes_toclient": 66, "bytes_toserver": 221, "pkts_toclient": 1, "pkts_toserver": 3, "start": "2018-02-14T16:15:48.029100+0000" }, "flow_id": 1001826366550444, "http": null, "metadata": null, "packet": "AnOyEqLEAj/VQic8CABFAgBXDWFAAGwGcaFNSFUOrB9BJ1jDDT3tGR1LIf/j3VAYAQBcmQAAAwAALyrgAAAAAABDb29raWU6IG1zdHNoYXNoPUFkbWluaXN0cg0KAQAIAAMAAAA=", "packet_info": { "linktype": 1 }, "payload": "AwAALyrgAAAAAABDb29raWU6IG1zdHNoYXNoPUFkbWluaXN0cg0KAQAIAAMAAAA=", "payload_printable": ".../*......Cookie: mstshash=Administr\r\n........", "pcap_cnt": 2091477, "proto": "TCP", "rdp": null, "sip": null, "smb": null, "snmp": null, "src_ip": "77.72.85.14", "src_port": 22723, "ssh": null, "stream": 0, "timestamp": "2018-02-14T16:15:48.275532+0000", "tx_id": null }, { "alert": { "action": "allowed", "category": "Misc activity", "gid": 1, "metadata": { "affected_product": null, "attack_target": [ "Client_and_Server" ], "confidence": [ "Medium" ], "created_at": [ "2010_07_30" ], "cve": null, "deployment": [ "Perimeter" ], "former_category": [ "INFO" ], "malware_family": null, "performance_impact": [ "Significant" ], "reviewed_at": null, "signature_severity": [ "Informational" ], "tag": null, "updated_at": [ "2023_04_25" ] }, "rev": 10, "severity": 3, "signature": "ET INFO RDP - Response To External Host", "signature_id": 2001330, "source": { "ip": "77.72.85.14", "port": 22723 }, "target": { "ip": "172.31.65.39", "port": 3389 } }, "app_proto": "rdp", "dest_ip": "77.72.85.14", "dest_port": 22723, "dns": null, "ether": { "dest_mac": "02:3f:d5:42:27:3c", "src_mac": "02:73:b2:12:a2:c4" }, "event_type": "alert", "files": null, "flow": { "bytes_toclient": 139, "bytes_toserver": 221, "pkts_toclient": 2, "pkts_toserver": 3, "start": "2018-02-14T16:15:48.029100+0000" }, "flow_id": 1001826366550444, "http": null, "metadata": null, "packet": "Aj/VQic8AnOyEqLECABFAgA7PsdAAIAGAACsH0EnTUhVDg09WMMh/+Pd7RkdelAY+dGPygAAAwAAEw7QAAASNAACHwgAAgAAAA==", "packet_info": { "linktype": 1 }, "payload": "AwAAEw7QAAASNAACHwgAAgAAAA==", "payload_printable": ".........4.........", "pcap_cnt": 2091478, "proto": "TCP", "rdp": { "cookie": "Administr", "event_type": "initial_request", "protocol": null, "server_supports": null, "tx_id": 0 }, "sip": null, "smb": null, "snmp": null, "src_ip": "172.31.65.39", "src_port": 3389, "ssh": null, "stream": 0, "timestamp": "2018-02-14T16:15:48.278381+0000", "tx_id": null }, { "alert": { "action": "allowed", "category": "Generic Protocol Command Decode", "gid": 1, "metadata": { "affected_product": null, "attack_target": null, "confidence": null, "created_at": [ "2011_04_22" ], "cve": null, "deployment": null, "former_category": null, "malware_family": null, "performance_impact": null, "reviewed_at": null, "signature_severity": null, "tag": null, "updated_at": [ "2011_04_22" ] }, "rev": 5, "severity": 3, "signature": "ET POLICY MS Remote Desktop Administrator Login Request", "signature_id": 2012709, "source": null, "target": null }, "app_proto": "rdp", "dest_ip": "172.31.65.39", "dest_port": 3389, "dns": null, "ether": { "dest_mac": "02:73:b2:12:a2:c4", "src_mac": "02:3f:d5:42:27:3c" }, "event_type": "alert", "files": null, "flow": { "bytes_toclient": 836, "bytes_toserver": 2228, "pkts_toclient": 8, "pkts_toserver": 15, "start": "2018-02-14T16:15:48.029100+0000" }, "flow_id": 1001826366550444, "http": null, "metadata": null, "packet": "AnOyEqLEAj/VQic8CABFAAAoDcRAAGwGcW9NSFUOrB9BJ1jDDT3tGSLJIf/swVARAP+akwAA", "packet_info": { "linktype": 1 }, "payload": "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", "payload_printable": ".../*......Cookie: mstshash=Administr\r\n...................Z.`.*\n.D.\\.u.._..\rq.`..\"..k...4...4.(.'.........9.3.....=.<.5./.,.+.$.#.\[email protected].\n.....5.\n...............\r.......................#.......................B.!o].0M.....\\.!.....N*.[v%.e.ST..)..._hk,...x...q..5......./..q....\r..#f.........\\N.g.....E.....oi.EgV.._.%....Cp...........z;\r.D....-G.t.:ftK./....M\n.;.u...t..g...o#g.....h....)6...O..D......N.8..'[email protected]=PD.p......c.PU<.D.....$x....R..S...........(.........y=..5......R....h...J.((...........Q..............f..4...........!..QQhV.FuE{r.+...<.&...{.?......h....W(........'..z...............l....G......JL._ ..lmK...-...W?b,`,2.....c.;;.Yt...\"\n.^e...#7z..........G.u.o.^\".....@>E..I{.....v.N../#!P...r.P.`:.:|M\\+t..{Pi. ....a_....8. ..K....5V..:]..-.).U`:_Q.....q..Pm$\n....w.;..R.8...(>.b\"m{K..p....-E..B..B.&.....p....Z[oF.........S/....u\"%.X...]..6..On..........QJ.X.ed...v.2........\\.N.....;..\\R..'.^.a.~L...LP..U..H...Z.\\;..E[.C...V........../...v\rNi6wi:.....W0..~.&(..S%..]rf.U`.r..]..X..\\..... 3p..WT\n..?..4.....}.Ci.($...>...N.m..l...Y.-..\\U?....h.5.....,..n..\\.b..\"7...........J.\\\r..:....e.W....^[email protected]\r.Y...=.E1..;b.`uv..-.}.~~......,..d..s........,..BE........s.....L..cQ..A.....&2......c..\"....\r>T.....9..k.r.^.z60.KT.......W..sK.2Dc.W.)..(.I.F_..&....u....=..............3..R..`t........\n+.L......=9.....bX7.\n.\"...=.]~....!.........zH..f./....wCg..z.%X.M.p", "pcap_cnt": 2091510, "proto": "TCP", "rdp": null, "sip": null, "smb": null, "snmp": null, "src_ip": "77.72.85.14", "src_port": 22723, "ssh": null, "stream": 1, "timestamp": "2018-02-14T16:15:51.827669+0000", "tx_id": null }, { "alert": { "action": "allowed", "category": "Misc activity", "gid": 1, "metadata": { "affected_product": null, "attack_target": [ "Client_and_Server" ], "confidence": [ "Medium" ], "created_at": [ "2010_07_30" ], "cve": null, "deployment": [ "Perimeter" ], "former_category": [ "INFO" ], "malware_family": null, "performance_impact": [ "Significant" ], "reviewed_at": null, "signature_severity": [ "Informational" ], "tag": null, "updated_at": [ "2023_04_25" ] }, "rev": 10, "severity": 3, "signature": "ET INFO RDP - Response To External Host", "signature_id": 2001330, "source": { "ip": "77.72.85.14", "port": 22723 }, "target": { "ip": "172.31.65.39", "port": 3389 } }, "app_proto": "rdp", "dest_ip": "77.72.85.14", "dest_port": 22723, "dns": null, "ether": { "dest_mac": "02:3f:d5:42:27:3c", "src_mac": "02:73:b2:12:a2:c4" }, "event_type": "alert", "files": null, "flow": { "bytes_toclient": 890, "bytes_toserver": 2228, "pkts_toclient": 9, "pkts_toserver": 15, "start": "2018-02-14T16:15:48.029100+0000" }, "flow_id": 1001826366550444, "http": null, "metadata": null, "packet": "Aj/VQic8AnOyEqLECABFAAAoPtBAAIAGAACsH0EnTUhVDg09WMMh/+zB7RkiylAQ9IKPtwAA", "packet_info": { "linktype": 1 }, "payload": "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", "payload_printable": ".........4...................(...........F9..GU,..'...q.I.f..5B.X..k................s..~8.\\....T.......J........\n4...\\.',..o...|............E..6CW..c>..lxp..wW.!.\r.u..x0.v......../U.....}i^.=.bb.b~6.t^..= .w..b...QR?\n..5.....-h...._...SJA..X.+.;S........Y..U..,..PJ....%/..jR.e..\n3..p*$...~..H..%..E..C2....o.........$..\"!...].#cm.W.ks.....4..h.y.3....pp..P....................]..^.........v.", "pcap_cnt": 2091511, "proto": "TCP", "rdp": null, "sip": null, "smb": null, "snmp": null, "src_ip": "172.31.65.39", "src_port": 3389, "ssh": null, "stream": 1, "timestamp": "2018-02-14T16:15:51.827705+0000", "tx_id": null } ]
158
1,679
172.31.68.25-172.31.0.2-56684-53-17
[ "flow" ]
event_type: flow, proto: TCP, flow_pkts_toserver: 3, flow_pkts_toclient: 3, flow_bytes_toserver: 170, flow_bytes_toclient: 170, flow_age: 1, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 17, tcp_tcp_flags_ts: 13, tcp_tcp_flags_tc: 16, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_ack: True, tcp_state: closed
false
BENIGN
false
12:30:38.535250
296
Wednesday-14-02-2018
[]
133
1,680
172.31.68.25-172.31.0.2-58654-53-17
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 88, flow_bytes_toclient: 104, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2082134, event_type: dns, proto: UDP, dns_type: query, dns_id: 34088, dns_rrname: j2global.widget.custhelp.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 2082135, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 34088, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: j2global.widget.custhelp.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: j2global.widget.custhelp.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 60, dns_answers_0_rdata: 74.117.206.68, dns_grouped_A_0: 74.117.206.68
false
BENIGN
false
12:30:38.540168
1,223
Wednesday-14-02-2018
[]
348
1,681
172.31.68.25-172.31.0.2-51006-53-17
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 75, flow_bytes_toclient: 139, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2090163, event_type: dns, proto: UDP, dns_type: query, dns_id: 16343, dns_rrname: master-clock.us, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 2090164, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 16343, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: master-clock.us, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: master-clock.us, dns_answers_0_rrtype: A, dns_answers_0_ttl: 60, dns_answers_0_rdata: 74.115.4.67, dns_answers_1_rrname: master-clock.us, dns_answers_1_rrtype: A, dns_answers_1_ttl: 60, dns_answers_1_rdata: 74.115.4.68, dns_answers_2_rrname: master-clock.us, dns_answers_2_rrtype: A, dns_answers_2_ttl: 60, dns_answers_2_rdata: 74.115.4.69, dns_answers_3_rrname: master-clock.us, dns_answers_3_rrtype: A, dns_answers_3_ttl: 60, dns_answers_3_rdata: 74.115.0.81, dns_grouped_A_0: 74.115.4.67, dns_grouped_A_1: 74.115.4.68, dns_grouped_A_2: 74.115.4.69, dns_grouped_A_3: 74.115.0.81
false
BENIGN
false
12:30:38.542403
323
Wednesday-14-02-2018
[]
582
1,682
172.31.68.25-172.31.0.2-65387-53-17
[ "rdp", "rdp" ]
pcap_cnt: 2090661, event_type: rdp, proto: TCP, rdp_tx_id: 0, rdp_event_type: initial_request, rdp_cookie: Administr ; pcap_cnt: 2090662, event_type: rdp, proto: TCP, rdp_tx_id: 1, rdp_event_type: initial_response, rdp_server_supports_0: extended_client_data, rdp_server_supports_1: dynvc_gfx, rdp_server_supports_2: restricted_admin, rdp_server_supports_3: redirected_authentication, rdp_protocol: hybrid
null
BENIGN
false
12:30:38.548514
1,442
Wednesday-14-02-2018
[ { "alert": { "action": "allowed", "category": "Generic Protocol Command Decode", "gid": 1, "metadata": { "affected_product": null, "attack_target": null, "confidence": null, "created_at": [ "2011_04_22" ], "cve": null, "deployment": null, "former_category": null, "malware_family": null, "performance_impact": null, "reviewed_at": null, "signature_severity": null, "tag": null, "updated_at": [ "2011_04_22" ] }, "rev": 5, "severity": 3, "signature": "ET POLICY MS Remote Desktop Administrator Login Request", "signature_id": 2012709, "source": null, "target": null }, "app_proto": null, "dest_ip": "172.31.65.39", "dest_port": 3389, "dns": null, "ether": { "dest_mac": "02:73:b2:12:a2:c4", "src_mac": "02:3f:d5:42:27:3c" }, "event_type": "alert", "files": null, "flow": { "bytes_toclient": 66, "bytes_toserver": 221, "pkts_toclient": 1, "pkts_toserver": 3, "start": "2018-02-14T16:13:56.297753+0000" }, "flow_id": 1359601429941017, "http": null, "metadata": null, "packet": "AnOyEqLEAj/VQic8CABFAgBXBINAAGwGen9NSFUOrB9BJxIJDT3Kjrm+TLkRU1AYAQDROwAAAwAALyrgAAAAAABDb29raWU6IG1zdHNoYXNoPUFkbWluaXN0cg0KAQAIAAMAAAA=", "packet_info": { "linktype": 1 }, "payload": "AwAALyrgAAAAAABDb29raWU6IG1zdHNoYXNoPUFkbWluaXN0cg0KAQAIAAMAAAA=", "payload_printable": ".../*......Cookie: mstshash=Administr\r\n........", "pcap_cnt": 2090660, "proto": "TCP", "rdp": null, "sip": null, "smb": null, "snmp": null, "src_ip": "77.72.85.14", "src_port": 4617, "ssh": null, "stream": 0, "timestamp": "2018-02-14T16:13:56.601328+0000", "tx_id": null }, { "alert": { "action": "allowed", "category": "Misc activity", "gid": 1, "metadata": { "affected_product": null, "attack_target": [ "Client_and_Server" ], "confidence": [ "Medium" ], "created_at": [ "2010_07_30" ], "cve": null, "deployment": [ "Perimeter" ], "former_category": [ "INFO" ], "malware_family": null, "performance_impact": [ "Significant" ], "reviewed_at": null, "signature_severity": [ "Informational" ], "tag": null, "updated_at": [ "2023_04_25" ] }, "rev": 10, "severity": 3, "signature": "ET INFO RDP - Response To External Host", "signature_id": 2001330, "source": { "ip": "77.72.85.14", "port": 4617 }, "target": { "ip": "172.31.65.39", "port": 3389 } }, "app_proto": "rdp", "dest_ip": "77.72.85.14", "dest_port": 4617, "dns": null, "ether": { "dest_mac": "02:3f:d5:42:27:3c", "src_mac": "02:73:b2:12:a2:c4" }, "event_type": "alert", "files": null, "flow": { "bytes_toclient": 139, "bytes_toserver": 221, "pkts_toclient": 2, "pkts_toserver": 3, "start": "2018-02-14T16:13:56.297753+0000" }, "flow_id": 1359601429941017, "http": null, "metadata": null, "packet": "Aj/VQic8AnOyEqLECABFAgA7PedAAIAGAACsH0EnTUhVDg09EglMuRFTyo657VAY+dGPygAAAwAAEw7QAAASNAACHwgAAgAAAA==", "packet_info": { "linktype": 1 }, "payload": "AwAAEw7QAAASNAACHwgAAgAAAA==", "payload_printable": ".........4.........", "pcap_cnt": 2090661, "proto": "TCP", "rdp": { "cookie": "Administr", "event_type": "initial_request", "protocol": null, "server_supports": null, "tx_id": 0 }, "sip": null, "smb": null, "snmp": null, "src_ip": "172.31.65.39", "src_port": 3389, "ssh": null, "stream": 0, "timestamp": "2018-02-14T16:13:56.604140+0000", "tx_id": null }, { "alert": { "action": "allowed", "category": "Generic Protocol Command Decode", "gid": 1, "metadata": { "affected_product": null, "attack_target": null, "confidence": null, "created_at": [ "2011_04_22" ], "cve": null, "deployment": null, "former_category": null, "malware_family": null, "performance_impact": null, "reviewed_at": null, "signature_severity": null, "tag": null, "updated_at": [ "2011_04_22" ] }, "rev": 5, "severity": 3, "signature": "ET POLICY MS Remote Desktop Administrator Login Request", "signature_id": 2012709, "source": null, "target": null }, "app_proto": "rdp", "dest_ip": "172.31.65.39", "dest_port": 3389, "dns": null, "ether": { "dest_mac": "02:73:b2:12:a2:c4", "src_mac": "02:3f:d5:42:27:3c" }, "event_type": "alert", "files": null, "flow": { "bytes_toclient": 836, "bytes_toserver": 2228, "pkts_toclient": 8, "pkts_toserver": 15, "start": "2018-02-14T16:13:56.297753+0000" }, "flow_id": 1359601429941017, "http": null, "metadata": null, "packet": "AnOyEqLEAj/VQic8CABFAAAoBPdAAGwGejxNSFUOrB9BJxIJDT3Kjr88TLkaN1ARAP8PNgAA", "packet_info": { "linktype": 1 }, "payload": "AwAALyrgAAAAAABDb29raWU6IG1zdHNoYXNoPUFkbWluaXN0cg0KAQAIAAMAAAAWAwMAlgEAAJIDA1qEYEXyO1Ocn9xAny2QAHer3BpAvl+gfPt+x2qOO4q7AAA0wCjAJ8AUwBMAnwCeADkAMwCdAJwAPQA8ADUAL8AswCvAJMAjwArACQBqAEAAOAAyAAoAEwEAADUACgAGAAQAFwAYAAsAAgEAAA0AFAASBgEGAwQBBQECAQQDBQMCAwICACMAAAAXAAD/AQABABYDAwEGEAABAgEA7gHEVb3IUsbNeHzZO10xnSpVe7nltdKcN3SiB8IB9HaZyxG/NaNJ7sPJVsZtwVh9Kx3RZGKCCymtUvGvslDRgy2M4Ez9ep4lE81zdtd8Yg7jY7A6+7IckXRvpYka1drrT9YPPLLpB0wUGSVmyEkwpgV+4aHTNuD8kTHbKR5zgTLxoSkc+KF/w/UMaxLywqCHXJJvd50HJSEY4OU99UHMgra5uC27vZVBvgU7LBqCorOvNp8tYKF/5KdDFU5cst9sNuV2K0c1m2Gpx+P806r7rqA1ikigvA1rhVtsDJdVD4z+/nVy4FF6wVGXec/lx6KqzZq0GNxKJ9wxixcd0Vde0BQDAwABARYDAwAoAAAAAAAAAACm8mWzI0aN1QU3gnDZkDDLmcVYNzVcM+4OmhNipq8NYxcDAwBRAAAAAAAAAAEz4Szya9wEFicMaADYk1yQydzs9jflhWujIrGJ7AlWGzE4OUslUo/QYrBCJ63CISeI2qIncDJoe8Qce+qNARLiMf8k9nvqUzPgFwMDArMAAAAAAAAAAilwN60H5a7S5YFw7BucR4EUqXSUSYtcHY0DkPO5YM8i4Fum1i+PrHjyFuMuQqCdu53dqbveDAdBqVaib1wZouNHPrD7FZa8I8LwfyRtJ7MhhZ4fFwYqJr5w/ZxsbLX7WZ+CfDu/tTEs3oegpM5GUWeNYLnqvp+vPqBAwuhnrCF+9WvPuQPRSBFZrhtOSpYaOiYRzYjFK49U/obuA28tHh9h4qHhty94IxDmdGl5J0eWmWfVwJ1ovKF4npxpnRZHhQqNhNpIBrrIczcQbyagpK1boJR9Rw/j1sUfQXlSFWwmvCA4Q7V6mOz2cOWUu0AV1KE7HQXQSlhDPN83QbLb+MNXZ9C8yila33+0vfZoQLx+ltxtqMKrwJnq9D8VWEZ0y40lO2ouLWJKch9Vvm1qCh8EMxCgb8sXxpwlkM3O5qEjFsXyMOyftABdIF0gk2LzQlmjgToSd2xe8Ja5bLUK5CzCe6Sd9mv15mwPEqcsrSTMVUlbpnyA8GX7fuAYAuRKisj+fTOUQQq4e9oxMYQ2IhHjnhw1izwFwTVPJGbf0FeOsCGhpi9JETPbvovFoI2xbNKw3qmjO/zw6me4UilfZxxSTEUfHJbUvuea2vpkeaGzBRYqiUn5bhN2jhfh+sVXmFZpzRftl01W8SY4jEAeT2pIo6HOAiW0OX9AymrjT4N11qhEEtXo0b7zsEPWBUoWMUQLcIBHnl5LsQcsMZ1V5PrGEYemXE4gE3IHiFV19n9h8pp95ohk0H1n2U7VAOJlj4VEddC2IJWRLUxXe/xX9qGEYBfZkbcxowPQz80OMyk91eYbFvnExc7ynijvUsf78RawotsGAU/2jaikIGfVg0ETuwlSfzkX3rYDewcPBpCr1TIqVJnDhgrq/3dsh9O7tL8h0dJ6N3VNMMJkFwMDAD0AAAAAAAAAA1XTeCsAQmK9/ZibbXRIATJy9o7YlQnbLBwMzxHe6bfahdytKXG5U+4I1OFCdCwUm4nluif1FwMDACEAAAAAAAAABN2G/Blz1FNkhulWOo/chNXFAmKWu1hOn90=", "payload_printable": ".../*......Cookie: mstshash=Administr\r\n...................Z.`E.;[email protected]...@._.|.~.j.;....4.(.'.........9.3.....=.<.5./.,.+.$.#.\[email protected].\n.....5.\n...............\r.......................#.........................U..R..x|.;]1.*U{.....7t.....v....5.I...V.m.X}+..db..).R...P..-..L.z.%..sv.|b..c.:....to......O..<...L..%f.I0..~...6...1.).s.2..).......k.....\\.ow..%!...=.A.....-...A..;,.....6.-`....C.N\\..l6.v+G5.a.........5.H..\rk.[l..U....ur.Qz.Q.y..........J'.1....W^...........(..........e.#F...7.p..0...X75\\3....b..\rc....Q........3.,.k...'.h...\\.....7..k.\"....V.189K%R..b.B'..!'...'p2h{..{.....1.$.{.S3..............)p7.......p...G...t.I.\\......`.\".[../..x....B..........A.V.o\\...G>.....#...$m'.!.....*&.p..ll..Y..|;..1,.....FQg.`.....>[email protected].!~.k....H.Y..NJ..:&....+.T....o-..a..../x#..tiy'G..g...h..x..i..G.\n...H...s7.o&...[..}G.....AyR.l&. 8C.z...p...@...;...JXC<.7A....Wg...)Z.....h@.~..m.......?.XFt..%;j.-bJr.U.mj\n..3..o....%.....#...0....] ] .b.BY..:.wl^...l.\n.,.{...k..l...,.$.UI[.|..e.~....J...}3.A\n.{.11.6\"....5.<..5O$f..W..!../I.3.......l.....;...g.R)_g.RLE.........dy....*.I.n.v.....W.Vi....MV.&[email protected]....%[email protected].^K..,1.U......\\N .r..Uu..a..}..d.}g.N...e..Du.. ..-LW{.W...`....1......3)=..........(.R.........O.... g..A...R.9....{......2*T...\n..wl.....!..z7uM0.d....=........U.x+.Bb....mtH.2r......,...........)q.S....Bt,.....'.....!............s.Sd..V:......b..XN..", "pcap_cnt": 2090680, "proto": "TCP", "rdp": null, "sip": null, "smb": null, "snmp": null, "src_ip": "77.72.85.14", "src_port": 4617, "ssh": null, "stream": 1, "timestamp": "2018-02-14T16:14:00.462989+0000", "tx_id": null }, { "alert": { "action": "allowed", "category": "Misc activity", "gid": 1, "metadata": { "affected_product": null, "attack_target": [ "Client_and_Server" ], "confidence": [ "Medium" ], "created_at": [ "2010_07_30" ], "cve": null, "deployment": [ "Perimeter" ], "former_category": [ "INFO" ], "malware_family": null, "performance_impact": [ "Significant" ], "reviewed_at": null, "signature_severity": [ "Informational" ], "tag": null, "updated_at": [ "2023_04_25" ] }, "rev": 10, "severity": 3, "signature": "ET INFO RDP - Response To External Host", "signature_id": 2001330, "source": { "ip": "77.72.85.14", "port": 4617 }, "target": { "ip": "172.31.65.39", "port": 3389 } }, "app_proto": "rdp", "dest_ip": "77.72.85.14", "dest_port": 4617, "dns": null, "ether": { "dest_mac": "02:3f:d5:42:27:3c", "src_mac": "02:73:b2:12:a2:c4" }, "event_type": "alert", "files": null, "flow": { "bytes_toclient": 890, "bytes_toserver": 2228, "pkts_toclient": 9, "pkts_toserver": 15, "start": "2018-02-14T16:13:56.297753+0000" }, "flow_id": 1359601429941017, "http": null, "metadata": null, "packet": "Aj/VQic8AnOyEqLECABFAAAoPfBAAIAGAACsH0EnTUhVDg09EglMuRo3yo6/PVAQ9IKPtwAA", "packet_info": { "linktype": 1 }, "payload": "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", "payload_printable": ".........4...................(..........D>...5....M..........O..*G...................5...n...&...=j....-..Y8.%[email protected].}....-o?...3...K......d..^.AR1.3.....r.....i.4._..h.....O.,....X .K.........OP.k.]...F...y...8.......F....j.#.>....^..N.^.....)!../.#..:..fMc-<.s$.......!e.......bL'..#..l.!.<..%)l...Cw..u.....wB.4..........0{..U.>....e.D.............5...,t....(MYb...p", "pcap_cnt": 2090681, "proto": "TCP", "rdp": null, "sip": null, "smb": null, "snmp": null, "src_ip": "172.31.65.39", "src_port": 3389, "ssh": null, "stream": 1, "timestamp": "2018-02-14T16:14:00.463024+0000", "tx_id": null } ]
158
1,683
172.31.65.124-172.31.0.2-64426-53-17
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 68, flow_bytes_toclient: 150, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 3895215, event_type: dns, proto: UDP, dns_type: query, dns_id: 60466, dns_rrname: wish.com, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 3895220, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 60466, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: wish.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: wish.com, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 60, dns_authorities_0_soa_mname: ns-1071.awsdns-05.org, dns_authorities_0_soa_rname: awsdns-hostmaster.amazon.com, dns_authorities_0_soa_serial: 1, dns_authorities_0_soa_refresh: 7200, dns_authorities_0_soa_retry: 900, dns_authorities_0_soa_expire: 1209600, dns_authorities_0_soa_minimum: 86400
false
BENIGN
false
12:30:38.568002
13,961
Wednesday-14-02-2018
[]
423
1,684
172.31.68.25-172.31.0.2-54069-53-17
[ "flow", "dns", "dns", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 172, flow_bytes_toclient: 204, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2086305, event_type: dns, proto: UDP, dns_type: query, dns_id: 37354, dns_rrname: e8218.dscb1.akamaiedge.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 2086306, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 37354, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: e8218.dscb1.akamaiedge.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: e8218.dscb1.akamaiedge.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 10, dns_answers_0_rdata: 23.52.91.27, dns_grouped_A_0: 23.52.91.27 ; pcap_cnt: 2086317, event_type: dns, proto: UDP, dns_type: query, dns_id: 37354, dns_rrname: e8218.dscb1.akamaiedge.net, dns_rrtype: A, dns_tx_id: 2 ; pcap_cnt: 2086319, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 37354, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: e8218.dscb1.akamaiedge.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: e8218.dscb1.akamaiedge.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 10, dns_answers_0_rdata: 23.52.91.27, dns_grouped_A_0: 23.52.91.27
false
BENIGN
false
12:30:38.570603
488
Wednesday-14-02-2018
[]
641
1,685
172.31.68.25-172.31.0.2-61131-53-17
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 88, flow_bytes_toclient: 104, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2086961, event_type: dns, proto: UDP, dns_type: query, dns_id: 2188, dns_rrname: j2global.widget.custhelp.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 2086962, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 2188, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: j2global.widget.custhelp.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: j2global.widget.custhelp.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 60, dns_answers_0_rdata: 74.117.206.68, dns_grouped_A_0: 74.117.206.68
false
BENIGN
false
12:30:38.571137
302
Wednesday-14-02-2018
[]
348
1,686
172.31.68.25-172.31.0.2-65290-53-17
[ "flow", "http", "fileinfo", "fileinfo" ]
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 17, flow_pkts_toclient: 15, flow_bytes_toserver: 1373, flow_bytes_toclient: 1660, flow_age: 116, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: db, tcp_tcp_flags_ts: db, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_ecn: True, tcp_cwr: True, tcp_state: closed ; pcap_cnt: 2082782, event_type: http, proto: TCP, tx_id: 0, http_hostname: ocsp.pki.goog, http_url: /GTSGIAG3, http_http_user_agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:58.0) Gecko/20100101 Firefox/58.0, http_http_content_type: application/ocsp-response, http_http_method: POST, http_protocol: HTTP/1.1, http_status: 200, http_length: 463 ; pcap_cnt: 2082782, event_type: fileinfo, proto: TCP, http_hostname: ocsp.pki.goog, http_url: /GTSGIAG3, http_http_user_agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:58.0) Gecko/20100101 Firefox/58.0, http_http_content_type: application/ocsp-response, http_http_method: POST, http_protocol: HTTP/1.1, http_status: 200, http_length: 463, app_proto: http, fileinfo_filename: /GTSGIAG3, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 75, fileinfo_tx_id: 0 ; pcap_cnt: 2083187, event_type: fileinfo, proto: TCP, http_hostname: ocsp.pki.goog, http_url: /GTSGIAG3, http_http_user_agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:58.0) Gecko/20100101 Firefox/58.0, http_http_content_type: application/ocsp-response, http_http_method: POST, http_protocol: HTTP/1.1, http_status: 200, http_length: 463, app_proto: http, fileinfo_filename: /GTSGIAG3, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 463, fileinfo_tx_id: 0
false
BENIGN
false
12:30:38.624783
1,651
Wednesday-14-02-2018
[]
697
1,687
172.31.65.124-172.31.0.2-62887-53-17
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 79, flow_bytes_toclient: 163, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 3906480, event_type: dns, proto: UDP, dns_type: query, dns_id: 18603, dns_rrname: www.squid-cache.org, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 3906481, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 18603, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.squid-cache.org, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: www.squid-cache.org, dns_answers_0_rrtype: AAAA, dns_answers_0_ttl: 60, dns_answers_0_rdata: 2001:4800:7812:0514:be76:4eff:fe04:5ca1, dns_answers_1_rrname: www.squid-cache.org, dns_answers_1_rrtype: AAAA, dns_answers_1_ttl: 60, dns_answers_1_rdata: 2001:4b78:2003:0000:0000:0000:0000:0001, dns_answers_2_rrname: www.squid-cache.org, dns_answers_2_rrtype: AAAA, dns_answers_2_ttl: 60, dns_answers_2_rdata: 2001:19c0:000e:0013:0000:0000:0000:0033, dns_grouped_AAAA_0: 2001:4800:7812:0514:be76:4eff:fe04:5ca1, dns_grouped_AAAA_1: 2001:4b78:2003:0000:0000:0000:0000:0001, dns_grouped_AAAA_2: 2001:19c0:000e:0013:0000:0000:0000:0033
false
BENIGN
false
12:30:38.625370
1,122
Wednesday-14-02-2018
[]
596
1,688
172.31.68.25-172.31.0.2-52345-53-17
[ "dns", "dns" ]
pcap_cnt: 2086065, event_type: dns, proto: UDP, dns_type: query, dns_id: 44075, dns_rrname: clients1.google.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 2086068, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 44075, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: clients1.google.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: clients1.google.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 28, dns_answers_0_rdata: clients.l.google.com, dns_answers_1_rrname: clients.l.google.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 60, dns_answers_1_rdata: 209.85.203.113, dns_answers_2_rrname: clients.l.google.com, dns_answers_2_rrtype: A, dns_answers_2_ttl: 60, dns_answers_2_rdata: 209.85.203.138, dns_answers_3_rrname: clients.l.google.com, dns_answers_3_rrtype: A, dns_answers_3_ttl: 60, dns_answers_3_rdata: 209.85.203.139, dns_answers_4_rrname: clients.l.google.com, dns_answers_4_rrtype: A, dns_answers_4_ttl: 60, dns_answers_4_rdata: 209.85.203.100, dns_answers_5_rrname: clients.l.google.com, dns_answers_5_rrtype: A, dns_answers_5_ttl: 60, dns_answers_5_rdata: 209.85.203.101, dns_answers_6_rrname: clients.l.google.com, dns_answers_6_rrtype: A, dns_answers_6_ttl: 60, dns_answers_6_rdata: 209.85.203.102, dns_grouped_CNAME_0: clients.l.google.com, dns_grouped_A_0: 209.85.203.113, dns_grouped_A_1: 209.85.203.138, dns_grouped_A_2: 209.85.203.139, dns_grouped_A_3: 209.85.203.100, dns_grouped_A_4: 209.85.203.101, dns_grouped_A_5: 209.85.203.102
null
BENIGN
false
12:30:38.628052
467
Wednesday-14-02-2018
[]
771
1,689
172.31.65.124-31.13.65.7-49500-443-6
[ "dns", "dns" ]
pcap_cnt: 4171840, event_type: dns, proto: UDP, dns_type: query, dns_id: 32437, dns_rrname: vimeo.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 4171842, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 32437, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: vimeo.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: vimeo.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 60, dns_answers_0_rdata: 151.101.0.217, dns_answers_1_rrname: vimeo.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 60, dns_answers_1_rdata: 151.101.64.217, dns_answers_2_rrname: vimeo.com, dns_answers_2_rrtype: A, dns_answers_2_ttl: 60, dns_answers_2_rdata: 151.101.128.217, dns_answers_3_rrname: vimeo.com, dns_answers_3_rrtype: A, dns_answers_3_ttl: 60, dns_answers_3_rdata: 151.101.192.217, dns_grouped_A_0: 151.101.0.217, dns_grouped_A_1: 151.101.64.217, dns_grouped_A_2: 151.101.128.217, dns_grouped_A_3: 151.101.192.217
null
BENIGN
false
12:30:38.758311
941,808
Wednesday-14-02-2018
[]
496
1,691
172.31.68.25-172.31.0.2-57579-53-17
[ "rdp", "rdp" ]
pcap_cnt: 2092953, event_type: rdp, proto: TCP, rdp_tx_id: 0, rdp_event_type: initial_request, rdp_cookie: Administr ; pcap_cnt: 2092954, event_type: rdp, proto: TCP, rdp_tx_id: 1, rdp_event_type: initial_response, rdp_server_supports_0: extended_client_data, rdp_server_supports_1: dynvc_gfx, rdp_server_supports_2: restricted_admin, rdp_server_supports_3: redirected_authentication, rdp_protocol: hybrid
null
BENIGN
false
12:30:38.845575
1,589
Wednesday-14-02-2018
[ { "alert": { "action": "allowed", "category": "Generic Protocol Command Decode", "gid": 1, "metadata": { "affected_product": null, "attack_target": null, "confidence": null, "created_at": [ "2011_04_22" ], "cve": null, "deployment": null, "former_category": null, "malware_family": null, "performance_impact": null, "reviewed_at": null, "signature_severity": null, "tag": null, "updated_at": [ "2011_04_22" ] }, "rev": 5, "severity": 3, "signature": "ET POLICY MS Remote Desktop Administrator Login Request", "signature_id": 2012709, "source": null, "target": null }, "app_proto": null, "dest_ip": "172.31.65.39", "dest_port": 3389, "dns": null, "ether": { "dest_mac": "02:73:b2:12:a2:c4", "src_mac": "02:3f:d5:42:27:3c" }, "event_type": "alert", "files": null, "flow": { "bytes_toclient": 66, "bytes_toserver": 221, "pkts_toclient": 1, "pkts_toserver": 3, "start": "2018-02-14T16:18:48.135843+0000" }, "flow_id": 582701994742435, "http": null, "metadata": null, "packet": "AnOyEqLEAj/VQic8CABFAgBXIQlAAGwGXflNSFUOrB9BJ2MeDT2+LQ06aWHliFAYAQBILgAAAwAALyrgAAAAAABDb29raWU6IG1zdHNoYXNoPUFkbWluaXN0cg0KAQAIAAMAAAA=", "packet_info": { "linktype": 1 }, "payload": "AwAALyrgAAAAAABDb29raWU6IG1zdHNoYXNoPUFkbWluaXN0cg0KAQAIAAMAAAA=", "payload_printable": ".../*......Cookie: mstshash=Administr\r\n........", "pcap_cnt": 2092952, "proto": "TCP", "rdp": null, "sip": null, "smb": null, "snmp": null, "src_ip": "77.72.85.14", "src_port": 25374, "ssh": null, "stream": 0, "timestamp": "2018-02-14T16:18:48.470570+0000", "tx_id": null }, { "alert": { "action": "allowed", "category": "Misc activity", "gid": 1, "metadata": { "affected_product": null, "attack_target": [ "Client_and_Server" ], "confidence": [ "Medium" ], "created_at": [ "2010_07_30" ], "cve": null, "deployment": [ "Perimeter" ], "former_category": [ "INFO" ], "malware_family": null, "performance_impact": [ "Significant" ], "reviewed_at": null, "signature_severity": [ "Informational" ], "tag": null, "updated_at": [ "2023_04_25" ] }, "rev": 10, "severity": 3, "signature": "ET INFO RDP - Response To External Host", "signature_id": 2001330, "source": { "ip": "77.72.85.14", "port": 25374 }, "target": { "ip": "172.31.65.39", "port": 3389 } }, "app_proto": "rdp", "dest_ip": "77.72.85.14", "dest_port": 25374, "dns": null, "ether": { "dest_mac": "02:3f:d5:42:27:3c", "src_mac": "02:73:b2:12:a2:c4" }, "event_type": "alert", "files": null, "flow": { "bytes_toclient": 139, "bytes_toserver": 221, "pkts_toclient": 2, "pkts_toserver": 3, "start": "2018-02-14T16:18:48.135843+0000" }, "flow_id": 582701994742435, "http": null, "metadata": null, "packet": "Aj/VQic8AnOyEqLECABFAgA7QJ9AAIAGAACsH0EnTUhVDg09Yx5pYeWIvi0NaVAY+dGPygAAAwAAEw7QAAASNAACHwgAAgAAAA==", "packet_info": { "linktype": 1 }, "payload": "AwAAEw7QAAASNAACHwgAAgAAAA==", "payload_printable": ".........4.........", "pcap_cnt": 2092953, "proto": "TCP", "rdp": { "cookie": "Administr", "event_type": "initial_request", "protocol": null, "server_supports": null, "tx_id": 0 }, "sip": null, "smb": null, "snmp": null, "src_ip": "172.31.65.39", "src_port": 3389, "ssh": null, "stream": 0, "timestamp": "2018-02-14T16:18:48.473421+0000", "tx_id": null }, { "alert": { "action": "allowed", "category": "Generic Protocol Command Decode", "gid": 1, "metadata": { "affected_product": null, "attack_target": null, "confidence": null, "created_at": [ "2011_04_22" ], "cve": null, "deployment": null, "former_category": null, "malware_family": null, "performance_impact": null, "reviewed_at": null, "signature_severity": null, "tag": null, "updated_at": [ "2011_04_22" ] }, "rev": 5, "severity": 3, "signature": "ET POLICY MS Remote Desktop Administrator Login Request", "signature_id": 2012709, "source": null, "target": null }, "app_proto": "rdp", "dest_ip": "172.31.65.39", "dest_port": 3389, "dns": null, "ether": { "dest_mac": "02:73:b2:12:a2:c4", "src_mac": "02:3f:d5:42:27:3c" }, "event_type": "alert", "files": null, "flow": { "bytes_toclient": 836, "bytes_toserver": 2228, "pkts_toclient": 8, "pkts_toserver": 15, "start": "2018-02-14T16:18:48.135843+0000" }, "flow_id": 582701994742435, "http": null, "metadata": null, "packet": "AnOyEqLEAj/VQic8CABFAAAoIYFAAGwGXbJNSFUOrB9BJ2MeDT2+LRK4aWHubFARAP+GKAAA", "packet_info": { "linktype": 1 }, "payload": "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", "payload_printable": ".../*......Cookie: mstshash=Administr\r\n...................Z.ai....o.Tr.......%./...%.....E..4.(.'.........9.3.....=.<.5./.,.+.$.#.\[email protected].\n.....5.\n...............\r.......................#........................'.v.x.9..?...N.w..N...Y\r..seU\\.Q.1.:]:...4......$.........1[.]dD^....x.R..R^...=.6.n...M..a.......Z..L..\r...kkB6..3L:...m..H...i...y\r./x.....#.....lj..W_...qA........x.v\\6.~B..^.Z.....m...._<.......R...A...j.....V?....dq..lzL..i....qEr..k..|.3M...v@...............(...........sM!yE.M.e.?..3.4..CH.%.eH..}}....Q........+.r<,.s.+I..L1.)..{4g..0p........Z.......k.........k....N2..../...[.....w.............#'..I.....^.>l...s.k.`.....4.J..p...m.L...;..p3...7.r...wR}pS.P..aW..]..........#....H.5.>[email protected]#.....,......7zj7...ge.'.T.....<P%.yK.h.v&j../....1w.R.Y.T.8.@...:..3...........wS.O..T.n...&.p9....y5.?.v.Q._L..6C[..A.. ...*.........ff/ ..|\\...s.[\\...R....e.8w~.[G..Z.L*.l.\n....K...pEau...K.N`.Y.{:....dx..`=B..A.....GV%.%.Ip..{.<..J...;........$..?.Z.x.z..~...........[f.......Yv.4..M.H0.&:0...z....yFNz.....XZ\\.:...*..c...%.}\r....7......,..b.k....s...z_.>.A,.\r.f.....'z.d..\"z...-..'....#<....4..p...&&W:....4./...V..g...W9a.................Rh!.)f.}-...u.Z^.....)...d.[2...9..$Bo.h....go...tEy..@~2......\\.(r..bJ\r..Q.7..0U..@..|..^)ij..7Zg.\"..R.z..W..../=B8....f........L4..A.....Y....=........6J......w6.d+/[email protected].\r...l.....O^i.a..(..N.n....!........ .O..W.)..^.[...4......7.", "pcap_cnt": 2092974, "proto": "TCP", "rdp": null, "sip": null, "smb": null, "snmp": null, "src_ip": "77.72.85.14", "src_port": 25374, "ssh": null, "stream": 1, "timestamp": "2018-02-14T16:18:52.824137+0000", "tx_id": null }, { "alert": { "action": "allowed", "category": "Misc activity", "gid": 1, "metadata": { "affected_product": null, "attack_target": [ "Client_and_Server" ], "confidence": [ "Medium" ], "created_at": [ "2010_07_30" ], "cve": null, "deployment": [ "Perimeter" ], "former_category": [ "INFO" ], "malware_family": null, "performance_impact": [ "Significant" ], "reviewed_at": null, "signature_severity": [ "Informational" ], "tag": null, "updated_at": [ "2023_04_25" ] }, "rev": 10, "severity": 3, "signature": "ET INFO RDP - Response To External Host", "signature_id": 2001330, "source": { "ip": "77.72.85.14", "port": 25374 }, "target": { "ip": "172.31.65.39", "port": 3389 } }, "app_proto": "rdp", "dest_ip": "77.72.85.14", "dest_port": 25374, "dns": null, "ether": { "dest_mac": "02:3f:d5:42:27:3c", "src_mac": "02:73:b2:12:a2:c4" }, "event_type": "alert", "files": null, "flow": { "bytes_toclient": 890, "bytes_toserver": 2228, "pkts_toclient": 9, "pkts_toserver": 15, "start": "2018-02-14T16:18:48.135843+0000" }, "flow_id": 582701994742435, "http": null, "metadata": null, "packet": "Aj/VQic8AnOyEqLECABFAAAoQKlAAIAGAACsH0EnTUhVDg09Yx5pYe5svi0SuVAQ9IKPtwAA", "packet_info": { "linktype": 1 }, "payload": "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", "payload_printable": ".........4...................(.........9.. .U...\\h....kNlE..7.|....cV..............B.EL...T..K?....[YX..,5z,R{...>m0....TO3..{d(.#.-.F...J...L....,.^(.6..6.I..U0.f..F$.8}..G.T.)[email protected]./...4.U.....%tS.A...\n.9.....B.).,..*N.........\"..3.[..;.......x...>z{......[nPt...........|T.XO.0..?UB;[email protected]..\".........p...\"t/Y.4..\n....$K.kri.X.jW.............,76u....E........-", "pcap_cnt": 2092975, "proto": "TCP", "rdp": null, "sip": null, "smb": null, "snmp": null, "src_ip": "172.31.65.39", "src_port": 3389, "ssh": null, "stream": 1, "timestamp": "2018-02-14T16:18:52.824174+0000", "tx_id": null } ]
158
1,694
172.31.68.25-172.31.0.2-49442-53-17
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 90, flow_bytes_toclient: 155, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2079923, event_type: dns, proto: UDP, dns_type: query, dns_id: 55410, dns_rrname: dev.visualwebsiteoptimizer.com, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 2079928, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 55410, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: dev.visualwebsiteoptimizer.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: visualwebsiteoptimizer.com, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 60, dns_authorities_0_soa_mname: dns1.p07.nsone.net, dns_authorities_0_soa_rname: hostmaster.nsone.net, dns_authorities_0_soa_serial: 1516432252, dns_authorities_0_soa_refresh: 3600, dns_authorities_0_soa_retry: 600, dns_authorities_0_soa_expire: 1209600, dns_authorities_0_soa_minimum: 3600
false
BENIGN
false
12:30:38.849502
473
Wednesday-14-02-2018
[]
437
1,695
172.31.68.25-172.31.0.2-55815-53-17
[ "flow", "dns", "dns", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 188, flow_bytes_toclient: 308, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2095794, event_type: dns, proto: UDP, dns_type: query, dns_id: 38455, dns_rrname: sumo.external.zlb.scl3.mozilla.com, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 2095795, event_type: dns, proto: UDP, dns_type: query, dns_id: 38455, dns_rrname: sumo.external.zlb.scl3.mozilla.com, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 2095796, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 38455, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: sumo.external.zlb.scl3.mozilla.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: mozilla.com, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 60, dns_authorities_0_soa_mname: ns.mozilla.org, dns_authorities_0_soa_rname: sysadmins.mozilla.org, dns_authorities_0_soa_serial: 2018021300, dns_authorities_0_soa_refresh: 180, dns_authorities_0_soa_retry: 180, dns_authorities_0_soa_expire: 1209600, dns_authorities_0_soa_minimum: 60 ; pcap_cnt: 2095797, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 38455, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: sumo.external.zlb.scl3.mozilla.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: mozilla.com, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 60, dns_authorities_0_soa_mname: ns.mozilla.org, dns_authorities_0_soa_rname: sysadmins.mozilla.org, dns_authorities_0_soa_serial: 2018021300, dns_authorities_0_soa_refresh: 180, dns_authorities_0_soa_retry: 180, dns_authorities_0_soa_expire: 1209600, dns_authorities_0_soa_minimum: 60
false
BENIGN
false
12:30:38.861314
1,240
Wednesday-14-02-2018
[]
797
1,696
172.31.65.124-172.31.0.2-54048-53-17
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 78, flow_bytes_toclient: 146, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 3905335, event_type: dns, proto: UDP, dns_type: query, dns_id: 21191, dns_rrname: cs9.wac.phicdn.net, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 3905337, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 21191, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: cs9.wac.phicdn.net, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: wac.phicdn.net, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 60, dns_authorities_0_soa_mname: ns1.edgecastcdn.net, dns_authorities_0_soa_rname: noc.edgecast.com, dns_authorities_0_soa_serial: 2015012000, dns_authorities_0_soa_refresh: 3600, dns_authorities_0_soa_retry: 600, dns_authorities_0_soa_expire: 604800, dns_authorities_0_soa_minimum: 600
false
BENIGN
false
12:30:38.880912
31,550
Wednesday-14-02-2018
[]
435
1,697
212.92.116.6-172.31.67.117-51049-3389-6
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 77, flow_bytes_toclient: 129, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 3201033, event_type: dns, proto: UDP, dns_type: query, dns_id: 56268, dns_rrname: fonts.gstatic.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 3201034, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 56268, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: fonts.gstatic.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: fonts.gstatic.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 60, dns_answers_0_rdata: gstaticadssl.l.google.com, dns_answers_1_rrname: gstaticadssl.l.google.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 60, dns_answers_1_rdata: 216.58.198.67, dns_grouped_CNAME_0: gstaticadssl.l.google.com, dns_grouped_A_0: 216.58.198.67
false
BENIGN
false
12:30:38.913774
38
Wednesday-14-02-2018
[]
430
1,698
172.31.65.124-31.13.65.36-49508-443-6
[ "dns", "dns" ]
pcap_cnt: 4235059, event_type: dns, proto: UDP, dns_type: query, dns_id: 15697, dns_rrname: d30qxsiqsk9ejg.cloudfront.net, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 4235061, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 15697, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: d30qxsiqsk9ejg.cloudfront.net, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: d30qxsiqsk9ejg.cloudfront.net, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 60, dns_authorities_0_soa_mname: ns-735.awsdns-27.net, dns_authorities_0_soa_rname: awsdns-hostmaster.amazon.com, dns_authorities_0_soa_serial: 1, dns_authorities_0_soa_refresh: 7200, dns_authorities_0_soa_retry: 900, dns_authorities_0_soa_expire: 1209600, dns_authorities_0_soa_minimum: 86400
null
BENIGN
false
12:30:38.943414
772,414
Wednesday-14-02-2018
[]
380
1,699
172.31.65.124-8.43.72.98-49511-443-6
[ "dns", "dns", "dns", "dns" ]
pcap_cnt: 4334023, event_type: dns, proto: UDP, dns_type: query, dns_id: 15917, dns_rrname: www.medialit.org, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 4334024, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 15917, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.medialit.org, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: www.medialit.org, dns_answers_0_rrtype: A, dns_answers_0_ttl: 60, dns_answers_0_rdata: 206.188.193.253, dns_grouped_A_0: 206.188.193.253 ; pcap_cnt: 4334025, event_type: dns, proto: UDP, dns_type: query, dns_id: 15917, dns_rrname: www.medialit.org, dns_rrtype: A, dns_tx_id: 2 ; pcap_cnt: 4334026, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 15917, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.medialit.org, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: www.medialit.org, dns_answers_0_rrtype: A, dns_answers_0_ttl: 60, dns_answers_0_rdata: 206.188.193.253, dns_grouped_A_0: 206.188.193.253
null
BENIGN
false
12:30:38.954570
628,379
Wednesday-14-02-2018
[]
513
1,702
172.31.65.124-192.82.242.50-49512-443-6
[ "dns", "dns", "dns", "dns" ]
pcap_cnt: 4035483, event_type: dns, proto: UDP, dns_type: query, dns_id: 42073, dns_rrname: shield-normandy-elb-prod-2099053585.us-west-2.elb.amazonaws.com, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 4035486, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 42073, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: shield-normandy-elb-prod-2099053585.us-west-2.elb.amazonaws.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: us-west-2.elb.amazonaws.com, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 40, dns_authorities_0_soa_mname: ns-332.awsdns-41.com, dns_authorities_0_soa_rname: awsdns-hostmaster.amazon.com, dns_authorities_0_soa_serial: 1, dns_authorities_0_soa_refresh: 7200, dns_authorities_0_soa_retry: 900, dns_authorities_0_soa_expire: 1209600, dns_authorities_0_soa_minimum: 60 ; pcap_cnt: 4035487, event_type: dns, proto: UDP, dns_type: query, dns_id: 42073, dns_rrname: shield-normandy-elb-prod-2099053585.us-west-2.elb.amazonaws.com, dns_rrtype: AAAA, dns_tx_id: 2 ; pcap_cnt: 4035489, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 42073, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: shield-normandy-elb-prod-2099053585.us-west-2.elb.amazonaws.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: us-west-2.elb.amazonaws.com, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 40, dns_authorities_0_soa_mname: ns-332.awsdns-41.com, dns_authorities_0_soa_rname: awsdns-hostmaster.amazon.com, dns_authorities_0_soa_serial: 1, dns_authorities_0_soa_refresh: 7200, dns_authorities_0_soa_retry: 900, dns_authorities_0_soa_expire: 1209600, dns_authorities_0_soa_minimum: 60
null
BENIGN
false
12:30:38.956535
213,441
Wednesday-14-02-2018
[]
805
1,703
172.31.65.124-172.31.0.2-57337-53-17
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 76, flow_bytes_toclient: 92, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 3907852, event_type: dns, proto: UDP, dns_type: query, dns_id: 32142, dns_rrname: www.december.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 3907853, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 32142, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.december.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: www.december.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 60, dns_answers_0_rdata: 192.252.144.35, dns_grouped_A_0: 192.252.144.35
false
BENIGN
false
12:30:38.956930
1,819
Wednesday-14-02-2018
[]
335
1,704
172.31.65.124-172.31.0.2-57665-53-17
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 80, flow_bytes_toclient: 136, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 3905338, event_type: dns, proto: UDP, dns_type: query, dns_id: 54984, dns_rrname: a771.dscq.akamai.net, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 3905339, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 54984, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: a771.dscq.akamai.net, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: a771.dscq.akamai.net, dns_answers_0_rrtype: AAAA, dns_answers_0_ttl: 20, dns_answers_0_rdata: 2600:1408:2000:0000:0000:0000:17db:5897, dns_answers_1_rrname: a771.dscq.akamai.net, dns_answers_1_rrtype: AAAA, dns_answers_1_ttl: 20, dns_answers_1_rdata: 2600:1408:2000:0000:0000:0000:17db:5861, dns_grouped_AAAA_0: 2600:1408:2000:0000:0000:0000:17db:5897, dns_grouped_AAAA_1: 2600:1408:2000:0000:0000:0000:17db:5861
false
BENIGN
false
12:30:38.958163
267,140
Wednesday-14-02-2018
[]
492
1,705
172.31.65.124-172.31.0.2-53611-53-17
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 68, flow_bytes_toclient: 150, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 3906605, event_type: dns, proto: UDP, dns_type: query, dns_id: 20669, dns_rrname: wish.com, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 3906606, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 20669, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: wish.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: wish.com, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 60, dns_authorities_0_soa_mname: ns-1071.awsdns-05.org, dns_authorities_0_soa_rname: awsdns-hostmaster.amazon.com, dns_authorities_0_soa_serial: 1, dns_authorities_0_soa_refresh: 7200, dns_authorities_0_soa_retry: 900, dns_authorities_0_soa_expire: 1209600, dns_authorities_0_soa_minimum: 86400
false
BENIGN
false
12:30:39.040444
1,074
Wednesday-14-02-2018
[]
421
1,706
172.31.65.124-172.31.0.2-50859-53-17
[ "dns", "dns" ]
pcap_cnt: 3905407, event_type: dns, proto: UDP, dns_type: query, dns_id: 37812, dns_rrname: safebrowsing.googleapis.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 3905408, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 37812, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: safebrowsing.googleapis.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: safebrowsing.googleapis.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 60, dns_answers_0_rdata: 216.58.211.170, dns_grouped_A_0: 216.58.211.170
null
BENIGN
false
12:30:39.072120
509
Wednesday-14-02-2018
[]
265
1,708
172.31.65.124-68.67.180.44-49515-443-6
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 72, flow_bytes_toclient: 174, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 4517544, event_type: dns, proto: UDP, dns_type: query, dns_id: 56580, dns_rrname: gp.symcd.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 4517551, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 56580, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: gp.symcd.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: gp.symcd.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 60, dns_answers_0_rdata: ocsp-ds.ws.symantec.com.edgekey.net, dns_answers_1_rrname: ocsp-ds.ws.symantec.com.edgekey.net, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 16, dns_answers_1_rdata: e8218.dscb1.akamaiedge.net, dns_answers_2_rrname: e8218.dscb1.akamaiedge.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 8, dns_answers_2_rdata: 23.52.91.27, dns_grouped_CNAME_0: ocsp-ds.ws.symantec.com.edgekey.net, dns_grouped_CNAME_1: e8218.dscb1.akamaiedge.net, dns_grouped_A_0: 23.52.91.27
false
BENIGN
false
12:30:39.094781
98,905
Wednesday-14-02-2018
[]
568
1,709
172.31.68.25-94.31.29.16-49690-443-6
[ "flow", "tls" ]
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 10, flow_pkts_toclient: 8, flow_bytes_toserver: 1909, flow_bytes_toclient: 4900, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: db, tcp_tcp_flags_ts: db, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_ecn: True, tcp_cwr: True, tcp_state: closed ; pcap_cnt: 2086300, event_type: tls, proto: TCP, tls_subject: OU=Domain Control Validated, CN=*.afy11.net, tls_issuerdn: C=US, ST=Arizona, L=Scottsdale, O=GoDaddy.com, Inc., OU=http://certs.godaddy.com/repository/, CN=Go Daddy Secure Certificate Authority - G2, tls_serial: 00:82:A6:B3:B0:B4:62:49:CE, tls_fingerprint: 36:f3:c5:88:90:9c:71:f4:ac:ee:39:c9:25:c3:37:3f:d5:b5:c8:48, tls_sni: ad.afy11.net, tls_version: TLS 1.2, tls_notbefore: 2016-09-06T20:27:38, tls_notafter: 2019-09-06T20:27:38
false
BENIGN
false
12:30:39.109850
441,300
Wednesday-14-02-2018
[]
399
1,710
172.31.68.25-52.85.90.143-49691-443-6
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 80, flow_bytes_toclient: 220, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2084028, event_type: dns, proto: UDP, dns_type: query, dns_id: 7523, dns_rrname: cdnjs.cloudflare.com, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 2084036, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 7523, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: cdnjs.cloudflare.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: cdnjs.cloudflare.com, dns_answers_0_rrtype: AAAA, dns_answers_0_ttl: 60, dns_answers_0_rdata: 2400:cb00:2048:0001:0000:0000:6813:c066, dns_answers_1_rrname: cdnjs.cloudflare.com, dns_answers_1_rrtype: AAAA, dns_answers_1_ttl: 60, dns_answers_1_rdata: 2400:cb00:2048:0001:0000:0000:6813:c166, dns_answers_2_rrname: cdnjs.cloudflare.com, dns_answers_2_rrtype: AAAA, dns_answers_2_ttl: 60, dns_answers_2_rdata: 2400:cb00:2048:0001:0000:0000:6813:c266, dns_answers_3_rrname: cdnjs.cloudflare.com, dns_answers_3_rrtype: AAAA, dns_answers_3_ttl: 60, dns_answers_3_rdata: 2400:cb00:2048:0001:0000:0000:6813:c366, dns_answers_4_rrname: cdnjs.cloudflare.com, dns_answers_4_rrtype: AAAA, dns_answers_4_ttl: 60, dns_answers_4_rdata: 2400:cb00:2048:0001:0000:0000:6813:c466, dns_grouped_AAAA_0: 2400:cb00:2048:0001:0000:0000:6813:c066, dns_grouped_AAAA_1: 2400:cb00:2048:0001:0000:0000:6813:c166, dns_grouped_AAAA_2: 2400:cb00:2048:0001:0000:0000:6813:c266, dns_grouped_AAAA_3: 2400:cb00:2048:0001:0000:0000:6813:c366, dns_grouped_AAAA_4: 2400:cb00:2048:0001:0000:0000:6813:c466
false
BENIGN
false
12:30:39.110893
444,405
Wednesday-14-02-2018
[]
823
1,711
172.31.68.25-52.85.90.143-49692-443-6
[ "flow", "tls" ]
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 26, flow_pkts_toclient: 54, flow_bytes_toserver: 2551, flow_bytes_toclient: 51535, flow_age: 172, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: df, tcp_tcp_flags_ts: df, tcp_tcp_flags_tc: 1f, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_ecn: True, tcp_cwr: True, tcp_state: last_ack ; pcap_cnt: 2085541, event_type: tls, proto: TCP, tls_subject: C=US, ST=California, L=Menlo Park, O=Facebook, Inc., CN=*.facebook.com, tls_issuerdn: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert SHA2 High Assurance Server CA, tls_serial: 0B:3C:3B:60:1A:18:F5:9E:E2:B6:BB:05:60:5E:F2:C0, tls_fingerprint: bd:25:8c:1f:62:a4:a6:d9:cf:7d:98:12:d2:2e:2f:f5:7e:84:fb:36, tls_sni: connect.facebook.net, tls_version: TLS 1.2, tls_notbefore: 2017-12-15T00:00:00, tls_notafter: 2019-03-22T12:00:00
false
BENIGN
false
12:30:39.111867
92,859
Wednesday-14-02-2018
[]
426
1,712
172.31.68.25-52.85.90.143-49693-443-6
[ "flow", "tls" ]
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 10, flow_pkts_toclient: 9, flow_bytes_toserver: 1133, flow_bytes_toclient: 4370, flow_age: 1, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: df, tcp_tcp_flags_ts: df, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_ecn: True, tcp_cwr: True, tcp_state: last_ack ; pcap_cnt: 2090027, event_type: tls, proto: TCP, tls_subject: CN=www.hotspotshield.com, tls_issuerdn: C=US, O=Let's Encrypt, CN=Let's Encrypt Authority X3, tls_serial: 03:64:31:8D:83:22:D7:DB:70:0D:41:90:31:C4:02:82:55:DC, tls_fingerprint: 92:c4:43:46:ba:c1:d1:a2:aa:83:e3:08:c0:9d:b9:c4:c2:d7:c9:38, tls_sni: www.hotspotshield.com, tls_version: TLS 1.2, tls_notbefore: 2018-02-12T07:01:36, tls_notafter: 2018-05-13T07:01:36
false
BENIGN
false
12:30:39.113515
90,604
Wednesday-14-02-2018
[]
394
1,713
172.31.68.25-52.85.90.143-49694-443-6
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 77, flow_bytes_toclient: 109, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2083056, event_type: dns, proto: UDP, dns_type: query, dns_id: 41351, dns_rrname: www.admuncher.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 2083057, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 41351, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.admuncher.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: www.admuncher.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 60, dns_answers_0_rdata: 104.27.171.98, dns_answers_1_rrname: www.admuncher.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 60, dns_answers_1_rdata: 104.27.170.98, dns_grouped_A_0: 104.27.171.98, dns_grouped_A_1: 104.27.170.98
false
BENIGN
false
12:30:39.115159
90,393
Wednesday-14-02-2018
[]
422
1,714
172.31.68.25-52.85.90.143-49695-443-6
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 77, flow_bytes_toclient: 141, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2083080, event_type: dns, proto: UDP, dns_type: query, dns_id: 38657, dns_rrname: stackoverflow.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 2083081, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 38657, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: stackoverflow.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: stackoverflow.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 60, dns_answers_0_rdata: 151.101.1.69, dns_answers_1_rrname: stackoverflow.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 60, dns_answers_1_rdata: 151.101.65.69, dns_answers_2_rrname: stackoverflow.com, dns_answers_2_rrtype: A, dns_answers_2_ttl: 60, dns_answers_2_rdata: 151.101.129.69, dns_answers_3_rrname: stackoverflow.com, dns_answers_3_rrtype: A, dns_answers_3_ttl: 60, dns_answers_3_rdata: 151.101.193.69, dns_grouped_A_0: 151.101.1.69, dns_grouped_A_1: 151.101.65.69, dns_grouped_A_2: 151.101.129.69, dns_grouped_A_3: 151.101.193.69
false
BENIGN
false
12:30:39.116123
93,280
Wednesday-14-02-2018
[]
582
1,716
172.31.68.25-52.85.90.143-49696-443-6
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 82, flow_bytes_toclient: 98, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2086375, event_type: dns, proto: UDP, dns_type: query, dns_id: 9983, dns_rrname: e6603.g.akamaiedge.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 2086376, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 9983, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: e6603.g.akamaiedge.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: e6603.g.akamaiedge.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 20, dns_answers_0_rdata: 23.36.33.86, dns_grouped_A_0: 23.36.33.86
false
BENIGN
false
12:30:39.122878
111,034
Wednesday-14-02-2018
[]
353
1,717
172.31.68.25-151.101.200.176-49697-443-6
[ "rdp", "rdp" ]
pcap_cnt: 2091082, event_type: rdp, proto: TCP, rdp_tx_id: 0, rdp_event_type: initial_request, rdp_cookie: Administr ; pcap_cnt: 2091087, event_type: rdp, proto: TCP, rdp_tx_id: 1, rdp_event_type: initial_response, rdp_server_supports_0: extended_client_data, rdp_server_supports_1: dynvc_gfx, rdp_server_supports_2: restricted_admin, rdp_server_supports_3: redirected_authentication, rdp_protocol: hybrid
null
BENIGN
false
12:30:39.142572
423,321
Wednesday-14-02-2018
[ { "alert": { "action": "allowed", "category": "Generic Protocol Command Decode", "gid": 1, "metadata": { "affected_product": null, "attack_target": null, "confidence": null, "created_at": [ "2011_04_22" ], "cve": null, "deployment": null, "former_category": null, "malware_family": null, "performance_impact": null, "reviewed_at": null, "signature_severity": null, "tag": null, "updated_at": [ "2011_04_22" ] }, "rev": 5, "severity": 3, "signature": "ET POLICY MS Remote Desktop Administrator Login Request", "signature_id": 2012709, "source": null, "target": null }, "app_proto": null, "dest_ip": "172.31.65.39", "dest_port": 3389, "dns": null, "ether": { "dest_mac": "02:73:b2:12:a2:c4", "src_mac": "02:3f:d5:42:27:3c" }, "event_type": "alert", "files": null, "flow": { "bytes_toclient": 66, "bytes_toserver": 221, "pkts_toclient": 1, "pkts_toserver": 3, "start": "2018-02-14T16:14:43.758832+0000" }, "flow_id": 1975173325755440, "http": null, "metadata": null, "packet": "AnOyEqLEAj/VQic8CABFAgBXChFAAGwGdPFNSFUOrB9BJ2kBDT1ub/U8SZae7FAYAQAQbgAAAwAALyrgAAAAAABDb29raWU6IG1zdHNoYXNoPUFkbWluaXN0cg0KAQAIAAMAAAA=", "packet_info": { "linktype": 1 }, "payload": "AwAALyrgAAAAAABDb29raWU6IG1zdHNoYXNoPUFkbWluaXN0cg0KAQAIAAMAAAA=", "payload_printable": ".../*......Cookie: mstshash=Administr\r\n........", "pcap_cnt": 2091081, "proto": "TCP", "rdp": null, "sip": null, "smb": null, "snmp": null, "src_ip": "77.72.85.14", "src_port": 26881, "ssh": null, "stream": 0, "timestamp": "2018-02-14T16:14:43.999863+0000", "tx_id": null }, { "alert": { "action": "allowed", "category": "Misc activity", "gid": 1, "metadata": { "affected_product": null, "attack_target": [ "Client_and_Server" ], "confidence": [ "Medium" ], "created_at": [ "2010_07_30" ], "cve": null, "deployment": [ "Perimeter" ], "former_category": [ "INFO" ], "malware_family": null, "performance_impact": [ "Significant" ], "reviewed_at": null, "signature_severity": [ "Informational" ], "tag": null, "updated_at": [ "2023_04_25" ] }, "rev": 10, "severity": 3, "signature": "ET INFO RDP - Response To External Host", "signature_id": 2001330, "source": { "ip": "77.72.85.14", "port": 26881 }, "target": { "ip": "172.31.65.39", "port": 3389 } }, "app_proto": "rdp", "dest_ip": "77.72.85.14", "dest_port": 26881, "dns": null, "ether": { "dest_mac": "02:3f:d5:42:27:3c", "src_mac": "02:73:b2:12:a2:c4" }, "event_type": "alert", "files": null, "flow": { "bytes_toclient": 139, "bytes_toserver": 221, "pkts_toclient": 2, "pkts_toserver": 3, "start": "2018-02-14T16:14:43.758832+0000" }, "flow_id": 1975173325755440, "http": null, "metadata": null, "packet": "Aj/VQic8AnOyEqLECABFAgA7PmVAAIAGAACsH0EnTUhVDg09aQFJlp7sbm/1a1AY+dGPygAAAwAAEw7QAAASNAACHwgAAgAAAA==", "packet_info": { "linktype": 1 }, "payload": "AwAAEw7QAAASNAACHwgAAgAAAA==", "payload_printable": ".........4.........", "pcap_cnt": 2091082, "proto": "TCP", "rdp": { "cookie": "Administr", "event_type": "initial_request", "protocol": null, "server_supports": null, "tx_id": 0 }, "sip": null, "smb": null, "snmp": null, "src_ip": "172.31.65.39", "src_port": 3389, "ssh": null, "stream": 0, "timestamp": "2018-02-14T16:14:44.002679+0000", "tx_id": null }, { "alert": { "action": "allowed", "category": "Generic Protocol Command Decode", "gid": 1, "metadata": { "affected_product": null, "attack_target": null, "confidence": null, "created_at": [ "2011_04_22" ], "cve": null, "deployment": null, "former_category": null, "malware_family": null, "performance_impact": null, "reviewed_at": null, "signature_severity": null, "tag": null, "updated_at": [ "2011_04_22" ] }, "rev": 5, "severity": 3, "signature": "ET POLICY MS Remote Desktop Administrator Login Request", "signature_id": 2012709, "source": null, "target": null }, "app_proto": "rdp", "dest_ip": "172.31.65.39", "dest_port": 3389, "dns": null, "ether": { "dest_mac": "02:73:b2:12:a2:c4", "src_mac": "02:3f:d5:42:27:3c" }, "event_type": "alert", "files": null, "flow": { "bytes_toclient": 836, "bytes_toserver": 2228, "pkts_toclient": 8, "pkts_toserver": 15, "start": "2018-02-14T16:14:43.758832+0000" }, "flow_id": 1975173325755440, "http": null, "metadata": null, "packet": "AnOyEqLEAj/VQic8CABFAAAoCnxAAGwGdLdNSFUOrB9BJ2kBDT1ub/q6SZan0FARAP9OaAAA", "packet_info": { "linktype": 1 }, "payload": "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", "payload_printable": ".../*......Cookie: mstshash=Administr\r\n...................Z.`tH..mm..t|...;L`...........Gg..4.(.'.........9.3.....=.<.5./.,.+.$.#.\[email protected].\n.....5.\n...............\r.......................#.........................vW$._,.$...G.~..kg......=Y3)..n.....{t.4..\".)OI....Y.......3......|..../.......|#..K2(............(..WB...K.g..6..t.gRf......D..?.h.Dj...e..&..9....?3G...ZC....VRb..1^...~....c`..\n.:W.([email protected]./d...../)..n....8[5mbM.%.J[..........Jl...g>..........(........,.)Q.M.d...>.k<.go.cZ&f..|7.`..|....Q............&.....*+..I......p.(*...I.0.W#S'q.(r`......3g...<.=os.. o.1)...(....`[email protected].>$..f{w........S.*Pz..$\\.5&;..N,.....\\[email protected]...$.c..HKW.......R.,..h....X=;.~.pN..+.n..w..9B.Y|...6....Qf...../........9./.Yl.w...P:\r.Y.XC..(...>X.~..5.....S.Sn..xX..z.N(.a...e..Jq..R.6.........m.....C.s..:.c..O.2V.......TyZ_..\r~......I.....<.<RS.U_..r.....S.n. .......l...A.....N...f-...8.j]..\rY..@L...,?.......+6....*Bj..VJ..%.OH.`..;.j..B.g\"n....hy..v.......(..o...}[email protected]....\\......{KD..2...c.N\\..['.L.#...OY<.8.|....8B.....v....k.B..%..h14g.5S.O........18...,...{|.>0\\2.....G....k..r....@W....;.....1._.M!.{.u...k......~..=^c5...e.;C.I.w...Rq..........q;...^.-......a...f...V..5...P.......%...S....x8.......vu.....=..-zF.h....=........K*...ks..W.9..kL.R...s..Vy.M.R..]zq^..J......1..Vy.......!................Q..b....|.U.x..N.", "pcap_cnt": 2091112, "proto": "TCP", "rdp": null, "sip": null, "smb": null, "snmp": null, "src_ip": "77.72.85.14", "src_port": 26881, "ssh": null, "stream": 1, "timestamp": "2018-02-14T16:14:48.018929+0000", "tx_id": null }, { "alert": { "action": "allowed", "category": "Misc activity", "gid": 1, "metadata": { "affected_product": null, "attack_target": [ "Client_and_Server" ], "confidence": [ "Medium" ], "created_at": [ "2010_07_30" ], "cve": null, "deployment": [ "Perimeter" ], "former_category": [ "INFO" ], "malware_family": null, "performance_impact": [ "Significant" ], "reviewed_at": null, "signature_severity": [ "Informational" ], "tag": null, "updated_at": [ "2023_04_25" ] }, "rev": 10, "severity": 3, "signature": "ET INFO RDP - Response To External Host", "signature_id": 2001330, "source": { "ip": "77.72.85.14", "port": 26881 }, "target": { "ip": "172.31.65.39", "port": 3389 } }, "app_proto": "rdp", "dest_ip": "77.72.85.14", "dest_port": 26881, "dns": null, "ether": { "dest_mac": "02:3f:d5:42:27:3c", "src_mac": "02:73:b2:12:a2:c4" }, "event_type": "alert", "files": null, "flow": { "bytes_toclient": 890, "bytes_toserver": 2228, "pkts_toclient": 9, "pkts_toserver": 15, "start": "2018-02-14T16:14:43.758832+0000" }, "flow_id": 1975173325755440, "http": null, "metadata": null, "packet": "Aj/VQic8AnOyEqLECABFAAAoPm9AAIAGAACsH0EnTUhVDg09aQFJlqfQbm/6u1AQ9IKPtwAA", "packet_info": { "linktype": 1 }, "payload": "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", "payload_printable": ".........4...................(.........+|...v}.]..F...6...v.qZ.D-..2...............i|....._......f-..lH.g.>.......L..zW...t/..U0..&0.$.q.~{...u..S./...wHq ....+j.6.......se.....IX.N.......p]........1.\n....7..d... \r.,.P....}s.....Qi.5i....$...5.........C66.. X....P...i.d<.9..6.=.*.a..7.<rs...k..]....c7..f.\nU+ .../i. $....9k......0...DY{p.o.+....$..H]..^..u...................U-.5.......]4..}", "pcap_cnt": 2091113, "proto": "TCP", "rdp": null, "sip": null, "smb": null, "snmp": null, "src_ip": "172.31.65.39", "src_port": 3389, "ssh": null, "stream": 1, "timestamp": "2018-02-14T16:14:48.018964+0000", "tx_id": null } ]
158
1,718
172.31.65.124-72.167.239.239-49518-80-6
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 73, flow_bytes_toclient: 148, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 3905275, event_type: dns, proto: UDP, dns_type: query, dns_id: 26226, dns_rrname: www.faxfx.net, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 3905277, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 26226, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.faxfx.net, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: faxfx.net, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 60, dns_authorities_0_soa_mname: ns1.host-h.net, dns_authorities_0_soa_rname: postmaster.your-server.co.za, dns_authorities_0_soa_serial: 2014091001, dns_authorities_0_soa_refresh: 86400, dns_authorities_0_soa_retry: 1800, dns_authorities_0_soa_expire: 3600000, dns_authorities_0_soa_minimum: 86400
false
BENIGN
false
12:30:39.164390
83,112
Wednesday-14-02-2018
[]
426
1,719
172.31.65.124-172.31.0.2-58612-53-17
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 78, flow_bytes_toclient: 94, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 3909110, event_type: dns, proto: UDP, dns_type: query, dns_id: 53786, dns_rrname: cs9.wac.phicdn.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 3909112, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 53786, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: cs9.wac.phicdn.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: cs9.wac.phicdn.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 60, dns_answers_0_rdata: 72.21.91.29, dns_grouped_A_0: 72.21.91.29
false
BENIGN
false
12:30:39.213064
365
Wednesday-14-02-2018
[]
350
1,720
172.31.65.124-172.31.0.2-65031-53-17
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 73, flow_bytes_toclient: 89, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 3902156, event_type: dns, proto: UDP, dns_type: query, dns_id: 22313, dns_rrname: faxbetter.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 3902157, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 22313, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: faxbetter.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: faxbetter.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 60, dns_answers_0_rdata: 104.208.232.49, dns_grouped_A_0: 104.208.232.49
false
BENIGN
false
12:30:39.213389
850
Wednesday-14-02-2018
[]
327
1,721
172.31.65.124-172.31.0.2-50091-53-17
[ "flow", "dns", "dns", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 172, flow_bytes_toclient: 428, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 3900118, event_type: dns, proto: UDP, dns_type: query, dns_id: 10722, dns_rrname: ocsp.sca1b.amazontrust.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 3900122, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 10722, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: ocsp.sca1b.amazontrust.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: ocsp.sca1b.amazontrust.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 52, dns_answers_0_rdata: 13.33.165.55, dns_answers_1_rrname: ocsp.sca1b.amazontrust.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 52, dns_answers_1_rdata: 13.33.165.124, dns_answers_2_rrname: ocsp.sca1b.amazontrust.com, dns_answers_2_rrtype: A, dns_answers_2_ttl: 52, dns_answers_2_rdata: 13.33.165.125, dns_answers_3_rrname: ocsp.sca1b.amazontrust.com, dns_answers_3_rrtype: A, dns_answers_3_ttl: 52, dns_answers_3_rdata: 13.33.165.137, dns_answers_4_rrname: ocsp.sca1b.amazontrust.com, dns_answers_4_rrtype: A, dns_answers_4_ttl: 52, dns_answers_4_rdata: 13.33.165.140, dns_answers_5_rrname: ocsp.sca1b.amazontrust.com, dns_answers_5_rrtype: A, dns_answers_5_ttl: 52, dns_answers_5_rdata: 13.33.165.238, dns_answers_6_rrname: ocsp.sca1b.amazontrust.com, dns_answers_6_rrtype: A, dns_answers_6_ttl: 52, dns_answers_6_rdata: 13.33.165.4, dns_answers_7_rrname: ocsp.sca1b.amazontrust.com, dns_answers_7_rrtype: A, dns_answers_7_ttl: 52, dns_answers_7_rdata: 13.33.165.37, dns_grouped_A_0: 13.33.165.55, dns_grouped_A_1: 13.33.165.124, dns_grouped_A_2: 13.33.165.125, dns_grouped_A_3: 13.33.165.137, dns_grouped_A_4: 13.33.165.140, dns_grouped_A_5: 13.33.165.238, dns_grouped_A_6: 13.33.165.4, dns_grouped_A_7: 13.33.165.37 ; pcap_cnt: 3900200, event_type: dns, proto: UDP, dns_type: query, dns_id: 10722, dns_rrname: ocsp.sca1b.amazontrust.com, dns_rrtype: A, dns_tx_id: 2 ; pcap_cnt: 3900203, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 10722, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: ocsp.sca1b.amazontrust.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: ocsp.sca1b.amazontrust.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 52, dns_answers_0_rdata: 13.33.165.37, dns_answers_1_rrname: ocsp.sca1b.amazontrust.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 52, dns_answers_1_rdata: 13.33.165.55, dns_answers_2_rrname: ocsp.sca1b.amazontrust.com, dns_answers_2_rrtype: A, dns_answers_2_ttl: 52, dns_answers_2_rdata: 13.33.165.124, dns_answers_3_rrname: ocsp.sca1b.amazontrust.com, dns_answers_3_rrtype: A, dns_answers_3_ttl: 52, dns_answers_3_rdata: 13.33.165.125, dns_answers_4_rrname: ocsp.sca1b.amazontrust.com, dns_answers_4_rrtype: A, dns_answers_4_ttl: 52, dns_answers_4_rdata: 13.33.165.137, dns_answers_5_rrname: ocsp.sca1b.amazontrust.com, dns_answers_5_rrtype: A, dns_answers_5_ttl: 52, dns_answers_5_rdata: 13.33.165.140, dns_answers_6_rrname: ocsp.sca1b.amazontrust.com, dns_answers_6_rrtype: A, dns_answers_6_ttl: 52, dns_answers_6_rdata: 13.33.165.238, dns_answers_7_rrname: ocsp.sca1b.amazontrust.com, dns_answers_7_rrtype: A, dns_answers_7_ttl: 52, dns_answers_7_rdata: 13.33.165.4, dns_grouped_A_0: 13.33.165.37, dns_grouped_A_1: 13.33.165.55, dns_grouped_A_2: 13.33.165.124, dns_grouped_A_3: 13.33.165.125, dns_grouped_A_4: 13.33.165.137, dns_grouped_A_5: 13.33.165.140, dns_grouped_A_6: 13.33.165.238, dns_grouped_A_7: 13.33.165.4
false
BENIGN
false
12:30:39.231672
346
Wednesday-14-02-2018
[]
1,937
1,722
172.31.65.124-172.31.0.2-62043-53-17
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 73, flow_bytes_toclient: 137, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 3906647, event_type: dns, proto: UDP, dns_type: query, dns_id: 31100, dns_rrname: getpocket.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 3906648, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 31100, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: getpocket.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: getpocket.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 33, dns_answers_0_rdata: 34.233.111.195, dns_answers_1_rrname: getpocket.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 33, dns_answers_1_rdata: 52.72.69.150, dns_answers_2_rrname: getpocket.com, dns_answers_2_rrtype: A, dns_answers_2_ttl: 33, dns_answers_2_rdata: 52.200.6.250, dns_answers_3_rrname: getpocket.com, dns_answers_3_rrtype: A, dns_answers_3_ttl: 33, dns_answers_3_rdata: 34.205.250.50, dns_grouped_A_0: 34.233.111.195, dns_grouped_A_1: 52.72.69.150, dns_grouped_A_2: 52.200.6.250, dns_grouped_A_3: 34.205.250.50
false
BENIGN
false
12:30:39.341865
1,445
Wednesday-14-02-2018
[]
576
1,724
172.31.65.124-35.185.20.184-49520-443-6
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 83, flow_bytes_toclient: 99, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 3925846, event_type: dns, proto: UDP, dns_type: query, dns_id: 29938, dns_rrname: e10883.g.akamaiedge.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 3925847, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 29938, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: e10883.g.akamaiedge.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: e10883.g.akamaiedge.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 16, dns_answers_0_rdata: 23.36.34.36, dns_grouped_A_0: 23.36.34.36
false
BENIGN
false
12:30:39.360075
211,785
Wednesday-14-02-2018
[]
351
1,726
172.31.65.124-172.31.0.2-61032-53-17
[ "flow", "dns", "dns", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 158, flow_bytes_toclient: 438, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 3908433, event_type: dns, proto: UDP, dns_type: query, dns_id: 12610, dns_rrname: ajax.cloudflare.com, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 3908435, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 12610, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: ajax.cloudflare.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: ajax.cloudflare.com, dns_answers_0_rrtype: AAAA, dns_answers_0_ttl: 60, dns_answers_0_rdata: 2400:cb00:2048:0001:0000:0000:6813:c366, dns_answers_1_rrname: ajax.cloudflare.com, dns_answers_1_rrtype: AAAA, dns_answers_1_ttl: 60, dns_answers_1_rdata: 2400:cb00:2048:0001:0000:0000:6813:c466, dns_answers_2_rrname: ajax.cloudflare.com, dns_answers_2_rrtype: AAAA, dns_answers_2_ttl: 60, dns_answers_2_rdata: 2400:cb00:2048:0001:0000:0000:6813:c066, dns_answers_3_rrname: ajax.cloudflare.com, dns_answers_3_rrtype: AAAA, dns_answers_3_ttl: 60, dns_answers_3_rdata: 2400:cb00:2048:0001:0000:0000:6813:c166, dns_answers_4_rrname: ajax.cloudflare.com, dns_answers_4_rrtype: AAAA, dns_answers_4_ttl: 60, dns_answers_4_rdata: 2400:cb00:2048:0001:0000:0000:6813:c266, dns_grouped_AAAA_0: 2400:cb00:2048:0001:0000:0000:6813:c366, dns_grouped_AAAA_1: 2400:cb00:2048:0001:0000:0000:6813:c466, dns_grouped_AAAA_2: 2400:cb00:2048:0001:0000:0000:6813:c066, dns_grouped_AAAA_3: 2400:cb00:2048:0001:0000:0000:6813:c166, dns_grouped_AAAA_4: 2400:cb00:2048:0001:0000:0000:6813:c266 ; pcap_cnt: 3908473, event_type: dns, proto: UDP, dns_type: query, dns_id: 12610, dns_rrname: ajax.cloudflare.com, dns_rrtype: AAAA, dns_tx_id: 2 ; pcap_cnt: 3908478, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 12610, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: ajax.cloudflare.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: ajax.cloudflare.com, dns_answers_0_rrtype: AAAA, dns_answers_0_ttl: 59, dns_answers_0_rdata: 2400:cb00:2048:0001:0000:0000:6813:c266, dns_answers_1_rrname: ajax.cloudflare.com, dns_answers_1_rrtype: AAAA, dns_answers_1_ttl: 59, dns_answers_1_rdata: 2400:cb00:2048:0001:0000:0000:6813:c366, dns_answers_2_rrname: ajax.cloudflare.com, dns_answers_2_rrtype: AAAA, dns_answers_2_ttl: 59, dns_answers_2_rdata: 2400:cb00:2048:0001:0000:0000:6813:c466, dns_answers_3_rrname: ajax.cloudflare.com, dns_answers_3_rrtype: AAAA, dns_answers_3_ttl: 59, dns_answers_3_rdata: 2400:cb00:2048:0001:0000:0000:6813:c066, dns_answers_4_rrname: ajax.cloudflare.com, dns_answers_4_rrtype: AAAA, dns_answers_4_ttl: 59, dns_answers_4_rdata: 2400:cb00:2048:0001:0000:0000:6813:c166, dns_grouped_AAAA_0: 2400:cb00:2048:0001:0000:0000:6813:c266, dns_grouped_AAAA_1: 2400:cb00:2048:0001:0000:0000:6813:c366, dns_grouped_AAAA_2: 2400:cb00:2048:0001:0000:0000:6813:c466, dns_grouped_AAAA_3: 2400:cb00:2048:0001:0000:0000:6813:c066, dns_grouped_AAAA_4: 2400:cb00:2048:0001:0000:0000:6813:c166
false
BENIGN
false
12:30:39.361155
328
Wednesday-14-02-2018
[]
1,568
1,727
172.31.65.124-172.31.0.2-53507-53-17
[ "flow", "dns", "dns", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 168, flow_bytes_toclient: 394, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 3907896, event_type: dns, proto: UDP, dns_type: query, dns_id: 23557, dns_rrname: detectportal.firefox.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 3907900, event_type: dns, proto: UDP, dns_type: query, dns_id: 23557, dns_rrname: detectportal.firefox.com, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 3907907, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 23557, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: detectportal.firefox.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: detectportal.firefox.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 60, dns_answers_0_rdata: detectportal.firefox.com.edgesuite.net, dns_answers_1_rrname: detectportal.firefox.com.edgesuite.net, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 60, dns_answers_1_rdata: a1089.d.akamai.net, dns_answers_2_rrname: a1089.d.akamai.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 9, dns_answers_2_rdata: 23.15.8.121, dns_answers_3_rrname: a1089.d.akamai.net, dns_answers_3_rrtype: A, dns_answers_3_ttl: 9, dns_answers_3_rdata: 23.15.8.131, dns_grouped_CNAME_0: detectportal.firefox.com.edgesuite.net, dns_grouped_CNAME_1: a1089.d.akamai.net, dns_grouped_A_0: 23.15.8.121, dns_grouped_A_1: 23.15.8.131 ; pcap_cnt: 3907908, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 23557, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: detectportal.firefox.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: detectportal.firefox.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 60, dns_answers_0_rdata: detectportal.firefox.com.edgesuite.net, dns_answers_1_rrname: detectportal.firefox.com.edgesuite.net, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 60, dns_answers_1_rdata: a1089.d.akamai.net, dns_answers_2_rrname: a1089.d.akamai.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 9, dns_answers_2_rdata: 23.15.8.121, dns_answers_3_rrname: a1089.d.akamai.net, dns_answers_3_rrtype: A, dns_answers_3_ttl: 9, dns_answers_3_rdata: 23.15.8.131, dns_grouped_A_0: 23.15.8.121, dns_grouped_A_1: 23.15.8.131, dns_grouped_CNAME_0: detectportal.firefox.com.edgesuite.net, dns_grouped_CNAME_1: a1089.d.akamai.net
false
BENIGN
false
12:30:39.388844
754
Wednesday-14-02-2018
[]
1,206
1,728
172.31.65.124-172.31.0.2-60475-53-17
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 87, flow_bytes_toclient: 148, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 3902448, event_type: dns, proto: UDP, dns_type: query, dns_id: 49349, dns_rrname: f3.shared.global.fastly.net, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 3902449, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 49349, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: f3.shared.global.fastly.net, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: fastly.net, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 0, dns_authorities_0_soa_mname: ns1.fastly.net, dns_authorities_0_soa_rname: hostmaster.fastly.com, dns_authorities_0_soa_serial: 2017052201, dns_authorities_0_soa_refresh: 3600, dns_authorities_0_soa_retry: 600, dns_authorities_0_soa_expire: 604800, dns_authorities_0_soa_minimum: 30
false
BENIGN
false
12:30:39.391066
262
Wednesday-14-02-2018
[]
431
1,729
172.31.68.25-94.31.29.16-49699-443-6
[ "rdp", "rdp" ]
pcap_cnt: 2088493, event_type: rdp, proto: TCP, rdp_tx_id: 0, rdp_event_type: initial_request, rdp_cookie: Administr ; pcap_cnt: 2088494, event_type: rdp, proto: TCP, rdp_tx_id: 1, rdp_event_type: initial_response, rdp_server_supports_0: extended_client_data, rdp_server_supports_1: dynvc_gfx, rdp_server_supports_2: restricted_admin, rdp_server_supports_3: redirected_authentication, rdp_protocol: hybrid
null
BENIGN
false
12:30:39.398084
152,667
Wednesday-14-02-2018
[ { "alert": { "action": "allowed", "category": "Generic Protocol Command Decode", "gid": 1, "metadata": { "affected_product": null, "attack_target": null, "confidence": null, "created_at": [ "2011_04_22" ], "cve": null, "deployment": null, "former_category": null, "malware_family": null, "performance_impact": null, "reviewed_at": null, "signature_severity": null, "tag": null, "updated_at": [ "2011_04_22" ] }, "rev": 5, "severity": 3, "signature": "ET POLICY MS Remote Desktop Administrator Login Request", "signature_id": 2012709, "source": null, "target": null }, "app_proto": null, "dest_ip": "172.31.65.39", "dest_port": 3389, "dns": null, "ether": { "dest_mac": "02:73:b2:12:a2:c4", "src_mac": "02:3f:d5:42:27:3c" }, "event_type": "alert", "files": null, "flow": { "bytes_toclient": 66, "bytes_toserver": 221, "pkts_toclient": 1, "pkts_toserver": 3, "start": "2018-02-14T16:10:11.973420+0000" }, "flow_id": 710067068590700, "http": null, "metadata": null, "packet": "AnOyEqLEAj/VQic8CABFAgBXbvBAAGwGEBJNSFUOrB9BJ5TfDT050kxqlO/pYlAYAQAsMAAAAwAALyrgAAAAAABDb29raWU6IG1zdHNoYXNoPUFkbWluaXN0cg0KAQAIAAMAAAA=", "packet_info": { "linktype": 1 }, "payload": "AwAALyrgAAAAAABDb29raWU6IG1zdHNoYXNoPUFkbWluaXN0cg0KAQAIAAMAAAA=", "payload_printable": ".../*......Cookie: mstshash=Administr\r\n........", "pcap_cnt": 2088492, "proto": "TCP", "rdp": null, "sip": null, "smb": null, "snmp": null, "src_ip": "77.72.85.14", "src_port": 38111, "ssh": null, "stream": 0, "timestamp": "2018-02-14T16:10:12.246524+0000", "tx_id": null }, { "alert": { "action": "allowed", "category": "Misc activity", "gid": 1, "metadata": { "affected_product": null, "attack_target": [ "Client_and_Server" ], "confidence": [ "Medium" ], "created_at": [ "2010_07_30" ], "cve": null, "deployment": [ "Perimeter" ], "former_category": [ "INFO" ], "malware_family": null, "performance_impact": [ "Significant" ], "reviewed_at": null, "signature_severity": [ "Informational" ], "tag": null, "updated_at": [ "2023_04_25" ] }, "rev": 10, "severity": 3, "signature": "ET INFO RDP - Response To External Host", "signature_id": 2001330, "source": { "ip": "77.72.85.14", "port": 38111 }, "target": { "ip": "172.31.65.39", "port": 3389 } }, "app_proto": "rdp", "dest_ip": "77.72.85.14", "dest_port": 38111, "dns": null, "ether": { "dest_mac": "02:3f:d5:42:27:3c", "src_mac": "02:73:b2:12:a2:c4" }, "event_type": "alert", "files": null, "flow": { "bytes_toclient": 139, "bytes_toserver": 221, "pkts_toclient": 2, "pkts_toserver": 3, "start": "2018-02-14T16:10:11.973420+0000" }, "flow_id": 710067068590700, "http": null, "metadata": null, "packet": "Aj/VQic8AnOyEqLECABFAgA7O/FAAIAGAACsH0EnTUhVDg09lN+U7+liOdJMmVAY+dGPygAAAwAAEw7QAAASNAACHwgAAgAAAA==", "packet_info": { "linktype": 1 }, "payload": "AwAAEw7QAAASNAACHwgAAgAAAA==", "payload_printable": ".........4.........", "pcap_cnt": 2088493, "proto": "TCP", "rdp": { "cookie": "Administr", "event_type": "initial_request", "protocol": null, "server_supports": null, "tx_id": 0 }, "sip": null, "smb": null, "snmp": null, "src_ip": "172.31.65.39", "src_port": 3389, "ssh": null, "stream": 0, "timestamp": "2018-02-14T16:10:12.249428+0000", "tx_id": null }, { "alert": { "action": "allowed", "category": "Generic Protocol Command Decode", "gid": 1, "metadata": { "affected_product": null, "attack_target": null, "confidence": null, "created_at": [ "2011_04_22" ], "cve": null, "deployment": null, "former_category": null, "malware_family": null, "performance_impact": null, "reviewed_at": null, "signature_severity": null, "tag": null, "updated_at": [ "2011_04_22" ] }, "rev": 5, "severity": 3, "signature": "ET POLICY MS Remote Desktop Administrator Login Request", "signature_id": 2012709, "source": null, "target": null }, "app_proto": "rdp", "dest_ip": "172.31.65.39", "dest_port": 3389, "dns": null, "ether": { "dest_mac": "02:73:b2:12:a2:c4", "src_mac": "02:3f:d5:42:27:3c" }, "event_type": "alert", "files": null, "flow": { "bytes_toclient": 836, "bytes_toserver": 2228, "pkts_toclient": 8, "pkts_toserver": 15, "start": "2018-02-14T16:10:11.973420+0000" }, "flow_id": 710067068590700, "http": null, "metadata": null, "packet": "AnOyEqLEAj/VQic8CABFAAAob4JAAGwGD7FNSFUOrB9BJ5TfDT050lHolO/yRlARAP9qKgAA", "packet_info": { "linktype": 1 }, "payload": "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", "payload_printable": ".../*......Cookie: mstshash=Administr\r\n...................Z._ej....7..p.EMf.5..O.\nK......U..4.(.'.........9.3.....=.<.5./.,.+.$.#.\[email protected].\n.....5.\n...............\r.......................#.........................,..U{.G\r..h...........C.L..L.?...%.........|../.Z.l.{.jZ..j.Soy...:.d....M.......[.......S.ScJ....?.K....^...=..d>.9?.........xt.}x....}b._...;.:]d.]...1pt..HY/...|.N.o..mL..Nb..%...D.LV=...F........\n...$.$5.3.aa.C.u.-.X,gvl9.....h .4..h.........6'..a|...........(.........F...[....?.=.`~.z%.9.....9.........Q.........i.. ..I...C..h....l....A.2.].W....h.E.%q.q......,...s*Q..{q.N..33E@D!...................:..O-tS...\\...{.04.l.t.m/..1..(.D`.X,\r....VB,....4_\"#.r...OX.....&......L.s.e.s.../O.4..M..ug....PMQ;.KJ*\"9...Q..t...9.k...o.5.1.~.......\"....... ..n.'\r....%.......?J......C!..G*.+-a.....\\.\"T@+....w%]....{)2.\".?.....e............k..o..\r.....\"..a.:.c....q`..4...O.i..>[email protected]....~.>.,. N8.6...:..;....:.5;...{Xh...{....*.9.{....h.\\....R......e.L......VP.E.....HA+..bt.....DG.H..*......k.`....,@V.|..[B1.e.2..smC.t]ZF}.x(C..q\r\r<.0-H3...;k.W.,P.1I.b.q.F.q.~40...6...z.a.W9...%S...;ouk`_.,~-...PA...m#f....Xy.7.}L..t...(.........Lf..o..........R.g.....>.8E7..+X...l.Xrpg.A&.Z........z.)].......(..j*.J.r5..;TM@~.s .d..'ZV...........2...`..=.E.\\?. Be..i..O.J.5......w.k..\\c.............=.........b..{[4..,Cu..R..+.....o2. w[.>.......%.$.4?..Y...}6.....!...............x%.WBy......q_..A.", "pcap_cnt": 2088528, "proto": "TCP", "rdp": null, "sip": null, "smb": null, "snmp": null, "src_ip": "77.72.85.14", "src_port": 38111, "ssh": null, "stream": 1, "timestamp": "2018-02-14T16:10:16.352288+0000", "tx_id": null }, { "alert": { "action": "allowed", "category": "Misc activity", "gid": 1, "metadata": { "affected_product": null, "attack_target": [ "Client_and_Server" ], "confidence": [ "Medium" ], "created_at": [ "2010_07_30" ], "cve": null, "deployment": [ "Perimeter" ], "former_category": [ "INFO" ], "malware_family": null, "performance_impact": [ "Significant" ], "reviewed_at": null, "signature_severity": [ "Informational" ], "tag": null, "updated_at": [ "2023_04_25" ] }, "rev": 10, "severity": 3, "signature": "ET INFO RDP - Response To External Host", "signature_id": 2001330, "source": { "ip": "77.72.85.14", "port": 38111 }, "target": { "ip": "172.31.65.39", "port": 3389 } }, "app_proto": "rdp", "dest_ip": "77.72.85.14", "dest_port": 38111, "dns": null, "ether": { "dest_mac": "02:3f:d5:42:27:3c", "src_mac": "02:73:b2:12:a2:c4" }, "event_type": "alert", "files": null, "flow": { "bytes_toclient": 890, "bytes_toserver": 2228, "pkts_toclient": 9, "pkts_toserver": 15, "start": "2018-02-14T16:10:11.973420+0000" }, "flow_id": 710067068590700, "http": null, "metadata": null, "packet": "Aj/VQic8AnOyEqLECABFAAAoO/tAAIAGAACsH0EnTUhVDg09lN+U7/JGOdJR6VAQ9IKPtwAA", "packet_info": { "linktype": 1 }, "payload": "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", "payload_printable": ".........4...................(.........p....&..U.....-.>n.\\*..9.~._5.....................;T....+...q.l..%..*...}X.0.\\...}e.\n.a.h./n....4.U..@\".y.>..../?u^P.Dj1.._M...X.].......;\r..|..l............:j2k...GB..m.;9a\\.^..}.[sd(......[.wn..W<19......Q.R ?../.....c.k..I.EILc.V.o.....d..V.T...u...v.i..nN..uf\".NV!....&..}....eC.i......y....4......d.cr..j.E....e..R..v.............#..[hz}.=D.1aapx.F", "pcap_cnt": 2088529, "proto": "TCP", "rdp": null, "sip": null, "smb": null, "snmp": null, "src_ip": "172.31.65.39", "src_port": 3389, "ssh": null, "stream": 1, "timestamp": "2018-02-14T16:10:16.352315+0000", "tx_id": null } ]
158
1,730
172.31.65.124-172.31.0.2-52151-53-17
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 79, flow_bytes_toclient: 176, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 3906942, event_type: dns, proto: UDP, dns_type: query, dns_id: 45569, dns_rrname: support.mozilla.org, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 3906943, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 45569, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: support.mozilla.org, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: support.mozilla.org, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 56, dns_answers_0_rdata: prod.sumo.moz.works, dns_answers_1_rrname: prod.sumo.moz.works, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 40, dns_answers_1_rdata: sumo.external.zlb.scl3.mozilla.com, dns_answers_2_rrname: sumo.external.zlb.scl3.mozilla.com, dns_answers_2_rrtype: A, dns_answers_2_ttl: 31, dns_answers_2_rdata: 63.245.213.32, dns_grouped_A_0: 63.245.213.32, dns_grouped_CNAME_0: prod.sumo.moz.works, dns_grouped_CNAME_1: sumo.external.zlb.scl3.mozilla.com
false
BENIGN
false
12:30:39.403395
391
Wednesday-14-02-2018
[]
541
1,731
172.31.65.124-172.31.0.2-49687-53-17
[ "flow", "dns", "dns", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 144, flow_bytes_toclient: 272, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 3906594, event_type: dns, proto: UDP, dns_type: query, dns_id: 28253, dns_rrname: netnanny.com, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 3906595, event_type: dns, proto: UDP, dns_type: query, dns_id: 28253, dns_rrname: netnanny.com, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 3906608, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 28253, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: netnanny.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: netnanny.com, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 60, dns_authorities_0_soa_mname: ns1.contentwatch.com, dns_authorities_0_soa_rname: hostmaster.netnanny.com, dns_authorities_0_soa_serial: 1500932190, dns_authorities_0_soa_refresh: 16384, dns_authorities_0_soa_retry: 2048, dns_authorities_0_soa_expire: 1048576, dns_authorities_0_soa_minimum: 2560 ; pcap_cnt: 3906609, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 28253, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: netnanny.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: netnanny.com, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 60, dns_authorities_0_soa_mname: ns1.contentwatch.com, dns_authorities_0_soa_rname: hostmaster.netnanny.com, dns_authorities_0_soa_serial: 1500932190, dns_authorities_0_soa_refresh: 16384, dns_authorities_0_soa_retry: 2048, dns_authorities_0_soa_expire: 1048576, dns_authorities_0_soa_minimum: 2560
false
BENIGN
false
12:30:39.437137
72,931
Wednesday-14-02-2018
[]
765
1,732
190.102.193.4-172.31.68.25-62201-445-6
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 68, flow_bytes_toclient: 84, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2083009, event_type: dns, proto: UDP, dns_type: query, dns_id: 49803, dns_rrname: wish.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 2083010, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 49803, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: wish.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: wish.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 1, dns_answers_0_rdata: 52.52.131.222, dns_grouped_A_0: 52.52.131.222
false
BENIGN
false
12:30:39.668015
284,089
Wednesday-14-02-2018
[]
324
1,736
172.31.67.108-172.31.0.2-64564-53-17
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 86, flow_bytes_toclient: 240, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 339, event_type: dns, proto: UDP, dns_type: query, dns_id: 59574, dns_rrname: tiles.services.mozilla.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 340, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 59574, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: tiles.services.mozilla.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: tiles.services.mozilla.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 48, dns_answers_0_rdata: tiles.r53-2.services.mozilla.com, dns_answers_1_rrname: tiles.r53-2.services.mozilla.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 5, dns_answers_1_rdata: 34.216.156.21, dns_answers_2_rrname: tiles.r53-2.services.mozilla.com, dns_answers_2_rrtype: A, dns_answers_2_ttl: 5, dns_answers_2_rdata: 35.160.58.123, dns_answers_3_rrname: tiles.r53-2.services.mozilla.com, dns_answers_3_rrtype: A, dns_answers_3_ttl: 5, dns_answers_3_rdata: 35.161.241.69, dns_answers_4_rrname: tiles.r53-2.services.mozilla.com, dns_answers_4_rrtype: A, dns_answers_4_ttl: 5, dns_answers_4_rdata: 54.70.252.70, dns_answers_5_rrname: tiles.r53-2.services.mozilla.com, dns_answers_5_rrtype: A, dns_answers_5_ttl: 5, dns_answers_5_rdata: 54.187.159.180, dns_answers_6_rrname: tiles.r53-2.services.mozilla.com, dns_answers_6_rrtype: A, dns_answers_6_ttl: 5, dns_answers_6_rdata: 54.213.128.137, dns_answers_7_rrname: tiles.r53-2.services.mozilla.com, dns_answers_7_rrtype: A, dns_answers_7_ttl: 5, dns_answers_7_rdata: 34.210.37.21, dns_answers_8_rrname: tiles.r53-2.services.mozilla.com, dns_answers_8_rrtype: A, dns_answers_8_ttl: 5, dns_answers_8_rdata: 34.211.99.53, dns_grouped_CNAME_0: tiles.r53-2.services.mozilla.com, dns_grouped_A_0: 34.216.156.21, dns_grouped_A_1: 35.160.58.123, dns_grouped_A_2: 35.161.241.69, dns_grouped_A_3: 54.70.252.70, dns_grouped_A_4: 54.187.159.180, dns_grouped_A_5: 54.213.128.137, dns_grouped_A_6: 34.210.37.21, dns_grouped_A_7: 34.211.99.53
false
BENIGN
false
12:30:39.724932
2,254
Wednesday-14-02-2018
[]
1,085
1,737
172.31.65.124-35.196.63.76-49526-443-6
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 87, flow_bytes_toclient: 103, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 4340023, event_type: dns, proto: UDP, dns_type: query, dns_id: 42781, dns_rrname: ocsp.godaddy.com.akadns.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 4340024, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 42781, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: ocsp.godaddy.com.akadns.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: ocsp.godaddy.com.akadns.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 39, dns_answers_0_rdata: 72.167.239.239, dns_grouped_A_0: 72.167.239.239
false
BENIGN
false
12:30:39.744602
103,882
Wednesday-14-02-2018
[]
359
1,738
172.31.67.108-172.31.0.2-64014-53-17
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 92, flow_bytes_toclient: 220, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 341, event_type: dns, proto: UDP, dns_type: query, dns_id: 20390, dns_rrname: tiles.r53-2.services.mozilla.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 342, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 20390, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: tiles.r53-2.services.mozilla.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: tiles.r53-2.services.mozilla.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 5, dns_answers_0_rdata: 34.211.99.53, dns_answers_1_rrname: tiles.r53-2.services.mozilla.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 5, dns_answers_1_rdata: 34.216.156.21, dns_answers_2_rrname: tiles.r53-2.services.mozilla.com, dns_answers_2_rrtype: A, dns_answers_2_ttl: 5, dns_answers_2_rdata: 35.160.58.123, dns_answers_3_rrname: tiles.r53-2.services.mozilla.com, dns_answers_3_rrtype: A, dns_answers_3_ttl: 5, dns_answers_3_rdata: 35.161.241.69, dns_answers_4_rrname: tiles.r53-2.services.mozilla.com, dns_answers_4_rrtype: A, dns_answers_4_ttl: 5, dns_answers_4_rdata: 54.70.252.70, dns_answers_5_rrname: tiles.r53-2.services.mozilla.com, dns_answers_5_rrtype: A, dns_answers_5_ttl: 5, dns_answers_5_rdata: 54.187.159.180, dns_answers_6_rrname: tiles.r53-2.services.mozilla.com, dns_answers_6_rrtype: A, dns_answers_6_ttl: 5, dns_answers_6_rdata: 54.213.128.137, dns_answers_7_rrname: tiles.r53-2.services.mozilla.com, dns_answers_7_rrtype: A, dns_answers_7_ttl: 5, dns_answers_7_rdata: 34.210.37.21, dns_grouped_A_0: 34.211.99.53, dns_grouped_A_1: 34.216.156.21, dns_grouped_A_2: 35.160.58.123, dns_grouped_A_3: 35.161.241.69, dns_grouped_A_4: 54.70.252.70, dns_grouped_A_5: 54.187.159.180, dns_grouped_A_6: 54.213.128.137, dns_grouped_A_7: 34.210.37.21
false
BENIGN
false
12:30:39.754715
496
Wednesday-14-02-2018
[]
994
1,739
172.31.67.108-172.31.0.2-51225-53-17
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 92, flow_bytes_toclient: 174, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 343, event_type: dns, proto: UDP, dns_type: query, dns_id: 40774, dns_rrname: tiles.r53-2.services.mozilla.com, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 345, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 40774, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: tiles.r53-2.services.mozilla.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: r53-2.services.mozilla.com, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 60, dns_authorities_0_soa_mname: ns-1507.awsdns-60.org, dns_authorities_0_soa_rname: awsdns-hostmaster.amazon.com, dns_authorities_0_soa_serial: 1, dns_authorities_0_soa_refresh: 7200, dns_authorities_0_soa_retry: 900, dns_authorities_0_soa_expire: 1209600, dns_authorities_0_soa_minimum: 86400
false
BENIGN
false
12:30:39.755531
1,146
Wednesday-14-02-2018
[]
445
1,740
172.31.67.114-169.254.169.254-49187-80-6
[ "dns", "dns", "dns", "dns" ]
pcap_cnt: 4366589, event_type: dns, proto: UDP, dns_type: query, dns_id: 53685, dns_rrname: e8218.dscb1.akamaiedge.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 4366590, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 53685, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: e8218.dscb1.akamaiedge.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: e8218.dscb1.akamaiedge.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 13, dns_answers_0_rdata: 23.52.91.27, dns_grouped_A_0: 23.52.91.27 ; pcap_cnt: 4366605, event_type: dns, proto: UDP, dns_type: query, dns_id: 53685, dns_rrname: e8218.dscb1.akamaiedge.net, dns_rrtype: A, dns_tx_id: 2 ; pcap_cnt: 4366608, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 53685, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: e8218.dscb1.akamaiedge.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: e8218.dscb1.akamaiedge.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 13, dns_answers_0_rdata: 23.52.91.27, dns_grouped_A_0: 23.52.91.27
null
BENIGN
false
12:30:39.857972
10,498
Wednesday-14-02-2018
[]
565
1,742
172.31.65.124-172.31.0.2-51380-53-17
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 86, flow_bytes_toclient: 114, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 3908825, event_type: dns, proto: UDP, dns_type: query, dns_id: 61058, dns_rrname: pagead46.l.doubleclick.net, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 3908826, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 61058, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: pagead46.l.doubleclick.net, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: pagead46.l.doubleclick.net, dns_answers_0_rrtype: AAAA, dns_answers_0_ttl: 60, dns_answers_0_rdata: 2a00:1450:400b:0c00:0000:0000:0000:009d, dns_grouped_AAAA_0: 2a00:1450:400b:0c00:0000:0000:0000:009d
false
BENIGN
false
12:30:39.866403
502
Wednesday-14-02-2018
[]
378
1,743
172.31.67.108-172.31.0.2-56554-53-17
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 77, flow_bytes_toclient: 125, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 355, event_type: dns, proto: UDP, dns_type: query, dns_id: 18422, dns_rrname: ocsp.digicert.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 356, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 18422, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: ocsp.digicert.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: ocsp.digicert.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 60, dns_answers_0_rdata: cs9.wac.phicdn.net, dns_answers_1_rrname: cs9.wac.phicdn.net, dns_answers_1_rrtype: A, dns_answers_1_ttl: 60, dns_answers_1_rdata: 72.21.91.29, dns_grouped_CNAME_0: cs9.wac.phicdn.net, dns_grouped_A_0: 72.21.91.29
false
BENIGN
false
12:30:40.047852
1,483
Wednesday-14-02-2018
[]
438
1,744
172.31.67.108-172.31.0.2-62104-53-17
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 78, flow_bytes_toclient: 94, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 358, event_type: dns, proto: UDP, dns_type: query, dns_id: 61663, dns_rrname: cs9.wac.phicdn.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 359, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 61663, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: cs9.wac.phicdn.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: cs9.wac.phicdn.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 60, dns_answers_0_rdata: 72.21.91.29, dns_grouped_A_0: 72.21.91.29
false
BENIGN
false
12:30:40.050246
307
Wednesday-14-02-2018
[]
346
1,745
172.31.67.108-172.31.0.2-59171-53-17
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 78, flow_bytes_toclient: 146, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 360, event_type: dns, proto: UDP, dns_type: query, dns_id: 18594, dns_rrname: cs9.wac.phicdn.net, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 361, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 18594, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: cs9.wac.phicdn.net, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: wac.phicdn.net, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 60, dns_authorities_0_soa_mname: ns1.edgecastcdn.net, dns_authorities_0_soa_rname: noc.edgecast.com, dns_authorities_0_soa_serial: 2015012000, dns_authorities_0_soa_refresh: 3600, dns_authorities_0_soa_retry: 600, dns_authorities_0_soa_expire: 604800, dns_authorities_0_soa_minimum: 600
false
BENIGN
false
12:30:40.050802
740
Wednesday-14-02-2018
[]
431
1,746
50.62.132.128-172.31.64.83-51278-3389-6
[ "flow", "anomaly" ]
event_type: flow, proto: TCP, app_proto: failed, app_proto_tc: tls, flow_pkts_toserver: 0, flow_pkts_toclient: 9, flow_bytes_toserver: 0, flow_bytes_toclient: 1417, flow_age: 20, flow_state: established, flow_reason: timeout, tcp_tcp_flags: 9d, tcp_tcp_flags_ts: 00, tcp_tcp_flags_tc: 9d, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_cwr: True, tcp_state: close_wait ; event_type: anomaly, proto: TCP, anomaly_type: applayer, anomaly_event: APPLAYER_WRONG_DIRECTION_FIRST_DATA, anomaly_layer: proto_detect
false
BENIGN
false
12:30:40.088770
559,724
Wednesday-14-02-2018
[]
209
1,747
172.31.68.25-151.139.236.194-49703-443-6
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 88, flow_bytes_toclient: 156, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2087682, event_type: dns, proto: UDP, dns_type: query, dns_id: 45563, dns_rrname: j2global.widget.custhelp.com, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 2087685, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 45563, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: j2global.widget.custhelp.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: custhelp.com, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 60, dns_authorities_0_soa_mname: dnsmasterva01.rightnowtech.com, dns_authorities_0_soa_rname: root.rightnowtech.com, dns_authorities_0_soa_serial: 1518624003, dns_authorities_0_soa_refresh: 600, dns_authorities_0_soa_retry: 180, dns_authorities_0_soa_expire: 1209600, dns_authorities_0_soa_minimum: 900
false
BENIGN
false
12:30:40.757552
315,921
Wednesday-14-02-2018
[]
435
1,749
172.31.68.25-23.36.32.162-49704-443-6
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 87, flow_bytes_toclient: 147, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2085678, event_type: dns, proto: UDP, dns_type: query, dns_id: 20349, dns_rrname: partnerad.l.doubleclick.net, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 2085686, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 20349, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: partnerad.l.doubleclick.net, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: l.doubleclick.net, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 42, dns_authorities_0_soa_mname: ns1.google.com, dns_authorities_0_soa_rname: dns-admin.google.com, dns_authorities_0_soa_serial: 185678643, dns_authorities_0_soa_refresh: 900, dns_authorities_0_soa_retry: 900, dns_authorities_0_soa_expire: 1800, dns_authorities_0_soa_minimum: 60
false
BENIGN
false
12:30:40.764272
669,922
Wednesday-14-02-2018
[]
425
1,750
172.31.68.25-172.31.0.2-64867-53-17
[ "rdp", "rdp" ]
pcap_cnt: 2093691, event_type: rdp, proto: TCP, rdp_tx_id: 0, rdp_event_type: initial_request, rdp_cookie: Administr ; pcap_cnt: 2093692, event_type: rdp, proto: TCP, rdp_tx_id: 1, rdp_event_type: initial_response, rdp_server_supports_0: extended_client_data, rdp_server_supports_1: dynvc_gfx, rdp_server_supports_2: restricted_admin, rdp_server_supports_3: redirected_authentication, rdp_protocol: hybrid
null
BENIGN
false
12:30:40.895135
1,890
Wednesday-14-02-2018
[ { "alert": { "action": "allowed", "category": "Generic Protocol Command Decode", "gid": 1, "metadata": { "affected_product": null, "attack_target": null, "confidence": null, "created_at": [ "2011_04_22" ], "cve": null, "deployment": null, "former_category": null, "malware_family": null, "performance_impact": null, "reviewed_at": null, "signature_severity": null, "tag": null, "updated_at": [ "2011_04_22" ] }, "rev": 5, "severity": 3, "signature": "ET POLICY MS Remote Desktop Administrator Login Request", "signature_id": 2012709, "source": null, "target": null }, "app_proto": null, "dest_ip": "172.31.65.39", "dest_port": 3389, "dns": null, "ether": { "dest_mac": "02:73:b2:12:a2:c4", "src_mac": "02:3f:d5:42:27:3c" }, "event_type": "alert", "files": null, "flow": { "bytes_toclient": 66, "bytes_toserver": 221, "pkts_toclient": 1, "pkts_toserver": 3, "start": "2018-02-14T16:20:38.608999+0000" }, "flow_id": 1957559688121063, "http": null, "metadata": null, "packet": "AnOyEqLEAj/VQic8CABFAgBXLElAAGwGUrlNSFUOrB9BJ2i3DT0GIZzowOPoO1AYAQAQvgAAAwAALyrgAAAAAABDb29raWU6IG1zdHNoYXNoPUFkbWluaXN0cg0KAQAIAAMAAAA=", "packet_info": { "linktype": 1 }, "payload": "AwAALyrgAAAAAABDb29raWU6IG1zdHNoYXNoPUFkbWluaXN0cg0KAQAIAAMAAAA=", "payload_printable": ".../*......Cookie: mstshash=Administr\r\n........", "pcap_cnt": 2093690, "proto": "TCP", "rdp": null, "sip": null, "smb": null, "snmp": null, "src_ip": "77.72.85.14", "src_port": 26807, "ssh": null, "stream": 0, "timestamp": "2018-02-14T16:20:38.844579+0000", "tx_id": null }, { "alert": { "action": "allowed", "category": "Misc activity", "gid": 1, "metadata": { "affected_product": null, "attack_target": [ "Client_and_Server" ], "confidence": [ "Medium" ], "created_at": [ "2010_07_30" ], "cve": null, "deployment": [ "Perimeter" ], "former_category": [ "INFO" ], "malware_family": null, "performance_impact": [ "Significant" ], "reviewed_at": null, "signature_severity": [ "Informational" ], "tag": null, "updated_at": [ "2023_04_25" ] }, "rev": 10, "severity": 3, "signature": "ET INFO RDP - Response To External Host", "signature_id": 2001330, "source": { "ip": "77.72.85.14", "port": 26807 }, "target": { "ip": "172.31.65.39", "port": 3389 } }, "app_proto": "rdp", "dest_ip": "77.72.85.14", "dest_port": 26807, "dns": null, "ether": { "dest_mac": "02:3f:d5:42:27:3c", "src_mac": "02:73:b2:12:a2:c4" }, "event_type": "alert", "files": null, "flow": { "bytes_toclient": 139, "bytes_toserver": 221, "pkts_toclient": 2, "pkts_toserver": 3, "start": "2018-02-14T16:20:38.608999+0000" }, "flow_id": 1957559688121063, "http": null, "metadata": null, "packet": "Aj/VQic8AnOyEqLECABFAgA7QbRAAIAGAACsH0EnTUhVDg09aLfA4+g7BiGdF1AY+dGPygAAAwAAEw7QAAASNAACHwgAAgAAAA==", "packet_info": { "linktype": 1 }, "payload": "AwAAEw7QAAASNAACHwgAAgAAAA==", "payload_printable": ".........4.........", "pcap_cnt": 2093691, "proto": "TCP", "rdp": { "cookie": "Administr", "event_type": "initial_request", "protocol": null, "server_supports": null, "tx_id": 0 }, "sip": null, "smb": null, "snmp": null, "src_ip": "172.31.65.39", "src_port": 3389, "ssh": null, "stream": 0, "timestamp": "2018-02-14T16:20:38.847383+0000", "tx_id": null }, { "alert": { "action": "allowed", "category": "Generic Protocol Command Decode", "gid": 1, "metadata": { "affected_product": null, "attack_target": null, "confidence": null, "created_at": [ "2011_04_22" ], "cve": null, "deployment": null, "former_category": null, "malware_family": null, "performance_impact": null, "reviewed_at": null, "signature_severity": null, "tag": null, "updated_at": [ "2011_04_22" ] }, "rev": 5, "severity": 3, "signature": "ET POLICY MS Remote Desktop Administrator Login Request", "signature_id": 2012709, "source": null, "target": null }, "app_proto": "rdp", "dest_ip": "172.31.65.39", "dest_port": 3389, "dns": null, "ether": { "dest_mac": "02:73:b2:12:a2:c4", "src_mac": "02:3f:d5:42:27:3c" }, "event_type": "alert", "files": null, "flow": { "bytes_toclient": 836, "bytes_toserver": 2228, "pkts_toclient": 8, "pkts_toserver": 15, "start": "2018-02-14T16:20:38.608999+0000" }, "flow_id": 1957559688121063, "http": null, "metadata": null, "packet": "AnOyEqLEAj/VQic8CABFAAAoLL9AAGwGUnRNSFUOrB9BJ2i3DT0GIaJmwOPxH1ARAP9OuAAA", "packet_info": { "linktype": 1 }, "payload": "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", "payload_printable": ".../*......Cookie: mstshash=Administr\r\n...................Z.a....(...3....0.............m...4.(.'.........9.3.....=.<.5./.,.+.$.#.\[email protected].\n.....5.\n...............\r.......................#......................CV..Jd.-.........b.j.... ...|.r.*.8..;.....=....T..i.......v.B ........../..)|%..\"...%.._.X.:(....\nO..u.>...0......N}|*g.Ga...6.....?.....q8.'@.......V./.....Q...:-3J?......L.!.4.tv0M.O.j.:.....z.......$.zE..-K..T(..]..s?.\nI............^...LX....5..l....D...........(.........Z.2...j..\n.+.NUn..<*..,..[..U......Q........).L.,.r\\...c..'.2m..6.2.g.. 9.w.@@!.zO<....^H`....C..3|.r.bc..g.j...LEb*u.............\r;...........S....}>..Y7\"...4.9..m.:.e.GP.......x,%...Y./...E......}T.8....<.%.....u..*nh......8...Q:9t.f...T.&.........1...OU.J....Gl!..lFfF..|.y.YM<.=A.#.H.;..,F......&.V.Y..-.7g.........3..F......C....w.8{P...[kc........O6.C..U....q.Q....=...4...o...U....o%iE...(p.8.i...('...\n7Aa^6.S.. ([(..\".'I!'..fXzPhoM....Lk..(]YF2]M ......?~.g....Aic\\.C.P...Ke.....>..X.8.................7`[email protected]\"....V.f....2Kq......q.....(......m/Kvqh.3>W.Y....5@m~...F)ga.\".....M^gz.....smv...L...\\)..`.'...wL..(v.O8..^~H.n...I.v....X....J.......,..t0.~.I.w.n...+.W..-d...9.f.5......H<....:....D.N...B..X&Q.....(...}....z;FBS'.yz..r........z...6c.u.+..4n%U$.y.........JO.$.H......=........j.r.0.....'..C9gs1.8.......O{[email protected].(...`......!........\\..#.L.7.C2....]....|..A.", "pcap_cnt": 2093711, "proto": "TCP", "rdp": null, "sip": null, "smb": null, "snmp": null, "src_ip": "77.72.85.14", "src_port": 26807, "ssh": null, "stream": 1, "timestamp": "2018-02-14T16:20:43.456472+0000", "tx_id": null }, { "alert": { "action": "allowed", "category": "Misc activity", "gid": 1, "metadata": { "affected_product": null, "attack_target": [ "Client_and_Server" ], "confidence": [ "Medium" ], "created_at": [ "2010_07_30" ], "cve": null, "deployment": [ "Perimeter" ], "former_category": [ "INFO" ], "malware_family": null, "performance_impact": [ "Significant" ], "reviewed_at": null, "signature_severity": [ "Informational" ], "tag": null, "updated_at": [ "2023_04_25" ] }, "rev": 10, "severity": 3, "signature": "ET INFO RDP - Response To External Host", "signature_id": 2001330, "source": { "ip": "77.72.85.14", "port": 26807 }, "target": { "ip": "172.31.65.39", "port": 3389 } }, "app_proto": "rdp", "dest_ip": "77.72.85.14", "dest_port": 26807, "dns": null, "ether": { "dest_mac": "02:3f:d5:42:27:3c", "src_mac": "02:73:b2:12:a2:c4" }, "event_type": "alert", "files": null, "flow": { "bytes_toclient": 890, "bytes_toserver": 2228, "pkts_toclient": 9, "pkts_toserver": 15, "start": "2018-02-14T16:20:38.608999+0000" }, "flow_id": 1957559688121063, "http": null, "metadata": null, "packet": "Aj/VQic8AnOyEqLECABFAAAoQb5AAIAGAACsH0EnTUhVDg09aLfA4/EfBiGiZ1AQ9IKPtwAA", "packet_info": { "linktype": 1 }, "payload": "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", "payload_printable": ".........4...................(.........1.m.]..\\.[./.U.\r@..:.P.....t.J..............R..\".V.(...C..A....f.....A.......iZp`Z;..}&..(......{.5....j,R.6_X.z.|.,\".)D....:NN..-.r.N...-P...K.9..M...T.......*E\\....Ac....@Q/^..s..H.i..T.*..,.'..........st........._.-}..R..&...D=.}..\"kT.:.\".^y....[.iv..H..s....o...+...xW....Ju..!N...R....5U&.CZ..}.P,\r....R...w..k9..'b........................qH..}<5.O", "pcap_cnt": 2093712, "proto": "TCP", "rdp": null, "sip": null, "smb": null, "snmp": null, "src_ip": "172.31.65.39", "src_port": 3389, "ssh": null, "stream": 1, "timestamp": "2018-02-14T16:20:43.456505+0000", "tx_id": null } ]
158
1,751
172.31.68.25-172.31.0.2-59835-53-17
[ "flow", "dns", "dns", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 166, flow_bytes_toclient: 198, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2085969, event_type: dns, proto: UDP, dns_type: query, dns_id: 17961, dns_rrname: any-na.mix.linkedin.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 2085972, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 17961, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: any-na.mix.linkedin.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: any-na.mix.linkedin.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 60, dns_answers_0_rdata: 108.174.10.14, dns_grouped_A_0: 108.174.10.14 ; pcap_cnt: 2086004, event_type: dns, proto: UDP, dns_type: query, dns_id: 17961, dns_rrname: any-na.mix.linkedin.com, dns_rrtype: A, dns_tx_id: 2 ; pcap_cnt: 2086010, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 17961, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: any-na.mix.linkedin.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: any-na.mix.linkedin.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 59, dns_answers_0_rdata: 108.174.10.14, dns_grouped_A_0: 108.174.10.14
false
BENIGN
false
12:30:40.994313
517
Wednesday-14-02-2018
[]
615
1,752
172.31.64.52-172.31.0.2-53206-53-17
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 93, flow_bytes_toclient: 109, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2389553, event_type: dns, proto: UDP, dns_type: query, dns_id: 55498, dns_rrname: www-googletagmanager.l.google.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 2389554, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 55498, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www-googletagmanager.l.google.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: www-googletagmanager.l.google.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 60, dns_answers_0_rdata: 209.85.202.97, dns_grouped_A_0: 209.85.202.97
false
BENIGN
false
12:30:41.042311
12,988
Wednesday-14-02-2018
[]
354
1,753
172.31.64.52-172.31.0.2-57574-53-17
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 96, flow_bytes_toclient: 112, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2377509, event_type: dns, proto: UDP, dns_type: query, dns_id: 14452, dns_rrname: bootstrapcdn.jdorfman.netdna-cdn.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 2377510, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 14452, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: bootstrapcdn.jdorfman.netdna-cdn.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: bootstrapcdn.jdorfman.netdna-cdn.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 60, dns_answers_0_rdata: 108.161.189.121, dns_grouped_A_0: 108.161.189.121
false
BENIGN
false
12:30:41.056727
39,204
Wednesday-14-02-2018
[]
363
1,754
172.31.64.52-172.31.0.2-63067-53-17
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 74, flow_bytes_toclient: 170, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2389590, event_type: dns, proto: UDP, dns_type: query, dns_id: 50866, dns_rrname: www.google.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 2389592, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 50866, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.google.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: www.google.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 60, dns_answers_0_rdata: 173.194.203.104, dns_answers_1_rrname: www.google.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 60, dns_answers_1_rdata: 173.194.203.105, dns_answers_2_rrname: www.google.com, dns_answers_2_rrtype: A, dns_answers_2_ttl: 60, dns_answers_2_rdata: 173.194.203.106, dns_answers_3_rrname: www.google.com, dns_answers_3_rrtype: A, dns_answers_3_ttl: 60, dns_answers_3_rdata: 173.194.203.147, dns_answers_4_rrname: www.google.com, dns_answers_4_rrtype: A, dns_answers_4_ttl: 60, dns_answers_4_rdata: 173.194.203.99, dns_answers_5_rrname: www.google.com, dns_answers_5_rrtype: A, dns_answers_5_ttl: 60, dns_answers_5_rdata: 173.194.203.103, dns_grouped_A_0: 173.194.203.104, dns_grouped_A_1: 173.194.203.105, dns_grouped_A_2: 173.194.203.106, dns_grouped_A_3: 173.194.203.147, dns_grouped_A_4: 173.194.203.99, dns_grouped_A_5: 173.194.203.103
false
BENIGN
false
12:30:41.061024
368
Wednesday-14-02-2018
[]
750
1,755
172.31.68.25-151.139.236.194-49706-443-6
[ "rdp", "rdp" ]
pcap_cnt: 2092408, event_type: rdp, proto: TCP, rdp_tx_id: 0, rdp_event_type: initial_request, rdp_cookie: Administr ; pcap_cnt: 2092409, event_type: rdp, proto: TCP, rdp_tx_id: 1, rdp_event_type: initial_response, rdp_server_supports_0: extended_client_data, rdp_server_supports_1: dynvc_gfx, rdp_server_supports_2: restricted_admin, rdp_server_supports_3: redirected_authentication, rdp_protocol: hybrid
null
BENIGN
false
12:30:41.103371
690,230
Wednesday-14-02-2018
[ { "alert": { "action": "allowed", "category": "Generic Protocol Command Decode", "gid": 1, "metadata": { "affected_product": null, "attack_target": null, "confidence": null, "created_at": [ "2011_04_22" ], "cve": null, "deployment": null, "former_category": null, "malware_family": null, "performance_impact": null, "reviewed_at": null, "signature_severity": null, "tag": null, "updated_at": [ "2011_04_22" ] }, "rev": 5, "severity": 3, "signature": "ET POLICY MS Remote Desktop Administrator Login Request", "signature_id": 2012709, "source": null, "target": null }, "app_proto": null, "dest_ip": "172.31.65.39", "dest_port": 3389, "dns": null, "ether": { "dest_mac": "02:73:b2:12:a2:c4", "src_mac": "02:3f:d5:42:27:3c" }, "event_type": "alert", "files": null, "flow": { "bytes_toclient": 66, "bytes_toserver": 221, "pkts_toclient": 1, "pkts_toserver": 3, "start": "2018-02-14T16:17:29.783406+0000" }, "flow_id": 1065514295751726, "http": null, "metadata": null, "packet": "AnOyEqLEAj/VQic8CABFAgBXGG1AAGwGZpVNSFUOrB9BJzoBDT0SQDns7meyhVAYAQCegwAAAwAALyrgAAAAAABDb29raWU6IG1zdHNoYXNoPUFkbWluaXN0cg0KAQAIAAMAAAA=", "packet_info": { "linktype": 1 }, "payload": "AwAALyrgAAAAAABDb29raWU6IG1zdHNoYXNoPUFkbWluaXN0cg0KAQAIAAMAAAA=", "payload_printable": ".../*......Cookie: mstshash=Administr\r\n........", "pcap_cnt": 2092407, "proto": "TCP", "rdp": null, "sip": null, "smb": null, "snmp": null, "src_ip": "77.72.85.14", "src_port": 14849, "ssh": null, "stream": 0, "timestamp": "2018-02-14T16:17:30.018565+0000", "tx_id": null }, { "alert": { "action": "allowed", "category": "Misc activity", "gid": 1, "metadata": { "affected_product": null, "attack_target": [ "Client_and_Server" ], "confidence": [ "Medium" ], "created_at": [ "2010_07_30" ], "cve": null, "deployment": [ "Perimeter" ], "former_category": [ "INFO" ], "malware_family": null, "performance_impact": [ "Significant" ], "reviewed_at": null, "signature_severity": [ "Informational" ], "tag": null, "updated_at": [ "2023_04_25" ] }, "rev": 10, "severity": 3, "signature": "ET INFO RDP - Response To External Host", "signature_id": 2001330, "source": { "ip": "77.72.85.14", "port": 14849 }, "target": { "ip": "172.31.65.39", "port": 3389 } }, "app_proto": "rdp", "dest_ip": "77.72.85.14", "dest_port": 14849, "dns": null, "ether": { "dest_mac": "02:3f:d5:42:27:3c", "src_mac": "02:73:b2:12:a2:c4" }, "event_type": "alert", "files": null, "flow": { "bytes_toclient": 139, "bytes_toserver": 221, "pkts_toclient": 2, "pkts_toserver": 3, "start": "2018-02-14T16:17:29.783406+0000" }, "flow_id": 1065514295751726, "http": null, "metadata": null, "packet": "Aj/VQic8AnOyEqLECABFAgA7P9NAAIAGAACsH0EnTUhVDg09OgHuZ7KFEkA6G1AY+dGPygAAAwAAEw7QAAASNAACHwgAAgAAAA==", "packet_info": { "linktype": 1 }, "payload": "AwAAEw7QAAASNAACHwgAAgAAAA==", "payload_printable": ".........4.........", "pcap_cnt": 2092408, "proto": "TCP", "rdp": { "cookie": "Administr", "event_type": "initial_request", "protocol": null, "server_supports": null, "tx_id": 0 }, "sip": null, "smb": null, "snmp": null, "src_ip": "172.31.65.39", "src_port": 3389, "ssh": null, "stream": 0, "timestamp": "2018-02-14T16:17:30.021437+0000", "tx_id": null }, { "alert": { "action": "allowed", "category": "Generic Protocol Command Decode", "gid": 1, "metadata": { "affected_product": null, "attack_target": null, "confidence": null, "created_at": [ "2011_04_22" ], "cve": null, "deployment": null, "former_category": null, "malware_family": null, "performance_impact": null, "reviewed_at": null, "signature_severity": null, "tag": null, "updated_at": [ "2011_04_22" ] }, "rev": 5, "severity": 3, "signature": "ET POLICY MS Remote Desktop Administrator Login Request", "signature_id": 2012709, "source": null, "target": null }, "app_proto": "rdp", "dest_ip": "172.31.65.39", "dest_port": 3389, "dns": null, "ether": { "dest_mac": "02:73:b2:12:a2:c4", "src_mac": "02:3f:d5:42:27:3c" }, "event_type": "alert", "files": null, "flow": { "bytes_toclient": 836, "bytes_toserver": 2228, "pkts_toclient": 8, "pkts_toserver": 15, "start": "2018-02-14T16:17:29.783406+0000" }, "flow_id": 1065514295751726, "http": null, "metadata": null, "packet": "AnOyEqLEAj/VQic8CABFAAAoGN1AAGwGZlZNSFUOrB9BJzoBDT0SQD9q7me7aVARAP/cfQAA", "packet_info": { "linktype": 1 }, "payload": "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", "payload_printable": ".../*......Cookie: mstshash=Administr\r\n...................Z.a..{u....W.h..0....b.[../.-.....4.(.'.........9.3.....=.<.5./.,.+.$.#.\[email protected].\n.....5.\n...............\r.......................#.......................w)[&f,OPoR..7.........a.6./[email protected]?.U......f]..M..A]..w..g'.r......D...,.TD..'.Z..l.21.....4....-...pc........p@d....!@kO?-..............5.M.a(r.K....\".sh].......x..;.WQO.<!....B..!.{)yQ......P>..*..\\..tH..,.%O1...R..........(.................9o..Z>.sD......U.....i.....Q..........\rsZ......u......2.....C...7{...T..'Q.+...y.`.......]#......#....ez.O.?..............P...#..@[email protected].+.....7..Ex..0.013y....7..:J...f.K...z...RC.I......v...~....9........ogT.a.{.....4&..........&........D...\"...U.........E.....C.$..z.C..oP....a.G...0.......F...F$wV.b......(..U.....o,J9.<.(.|...`.c........P?Dx(h+C2.......;F...w@m%.....(.TZ.......uq.7....3........~A.;.1H........\\S.....?.X....\\.w..A.8OBL.4..K..;...4.Bu.[S..*E...T.>Ou..wsx.....!.................2.p..\n........@\nU.6.Q.!.iVk6..![...8c.......9....Pv...9.`...*.......h...#f1..7ym.....T.l.j.!.\r....)YK.eL+*t9..)..1......)W...~&..u.Ci.....M0.[x....\nW.d..2>!J.h..-.5w..17..E...j....X........m....+...78 -...}....1Q...X,5.oD..M.=h.ovTY>#[email protected].).y|[email protected].%.n.....=.........X..G\\..)/.Q..._ki...:..]{.......C..?.......@+. i|.Z.....!..........p.}&..6TE.......ts...Q.", "pcap_cnt": 2092431, "proto": "TCP", "rdp": null, "sip": null, "smb": null, "snmp": null, "src_ip": "77.72.85.14", "src_port": 14849, "ssh": null, "stream": 1, "timestamp": "2018-02-14T16:17:34.552425+0000", "tx_id": null }, { "alert": { "action": "allowed", "category": "Misc activity", "gid": 1, "metadata": { "affected_product": null, "attack_target": [ "Client_and_Server" ], "confidence": [ "Medium" ], "created_at": [ "2010_07_30" ], "cve": null, "deployment": [ "Perimeter" ], "former_category": [ "INFO" ], "malware_family": null, "performance_impact": [ "Significant" ], "reviewed_at": null, "signature_severity": [ "Informational" ], "tag": null, "updated_at": [ "2023_04_25" ] }, "rev": 10, "severity": 3, "signature": "ET INFO RDP - Response To External Host", "signature_id": 2001330, "source": { "ip": "77.72.85.14", "port": 14849 }, "target": { "ip": "172.31.65.39", "port": 3389 } }, "app_proto": "rdp", "dest_ip": "77.72.85.14", "dest_port": 14849, "dns": null, "ether": { "dest_mac": "02:3f:d5:42:27:3c", "src_mac": "02:73:b2:12:a2:c4" }, "event_type": "alert", "files": null, "flow": { "bytes_toclient": 890, "bytes_toserver": 2228, "pkts_toclient": 9, "pkts_toserver": 15, "start": "2018-02-14T16:17:29.783406+0000" }, "flow_id": 1065514295751726, "http": null, "metadata": null, "packet": "Aj/VQic8AnOyEqLECABFAAAoP91AAIAGAACsH0EnTUhVDg09OgHuZ7tpEkA/a1AQ9IKPtwAA", "packet_info": { "linktype": 1 }, "payload": "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", "payload_printable": ".........4...................(........d .......H5....7..NE..e...k8.................C.\n%.q...?.L.7.5.....L.....@=..4?...<+...W.......{1-...,.Y...1..~...Z[.+...$%&LD4VV&..~... .......[.\nM........Vt..n..?K......l.................$..U....<.o.....A.-...z..I...:..fgu.....Y.gge..[...*.6_....\r`.l`O...V.K.d..6tc.....c.\n.\\..a..s.......t.!]..)[email protected].[}.W.Z...U...I].&3m................/9$...]0......(..", "pcap_cnt": 2092432, "proto": "TCP", "rdp": null, "sip": null, "smb": null, "snmp": null, "src_ip": "172.31.65.39", "src_port": 3389, "ssh": null, "stream": 1, "timestamp": "2018-02-14T16:17:34.552462+0000", "tx_id": null } ]
158
1,757
172.31.68.25-23.218.62.30-49707-443-6
[ "flow", "tls" ]
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 36, flow_pkts_toclient: 35, flow_bytes_toserver: 5726, flow_bytes_toclient: 7393, flow_age: 172, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: db, tcp_tcp_flags_ts: db, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_ecn: True, tcp_cwr: True, tcp_state: closed ; pcap_cnt: 2080708, event_type: tls, proto: TCP, tls_subject: C=US, ST=California, L=Mountain View, O=Google Inc, CN=*.google-analytics.com, tls_issuerdn: C=US, O=Google Trust Services, CN=Google Internet Authority G3, tls_serial: 43:9F:30:10:00:2C:6B:10, tls_fingerprint: e6:83:36:89:d6:d8:4b:aa:4e:15:4b:c3:01:40:8c:db:00:ca:b2:58, tls_sni: www.google-analytics.com, tls_version: TLS 1.2, tls_notbefore: 2018-01-30T09:37:08, tls_notafter: 2018-04-24T08:32:00
false
BENIGN
false
12:30:41.239891
754,268
Wednesday-14-02-2018
[]
378
1,759
195.175.11.46-172.31.65.39-56719-445-6
[ "dns", "dns", "dns", "dns" ]
pcap_cnt: 4322121, event_type: dns, proto: UDP, dns_type: query, dns_id: 10963, dns_rrname: sumo.external.zlb.scl3.mozilla.com, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 4322122, event_type: dns, proto: UDP, dns_type: query, dns_id: 10963, dns_rrname: sumo.external.zlb.scl3.mozilla.com, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 4322123, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 10963, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: sumo.external.zlb.scl3.mozilla.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: mozilla.com, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 60, dns_authorities_0_soa_mname: ns.mozilla.org, dns_authorities_0_soa_rname: sysadmins.mozilla.org, dns_authorities_0_soa_serial: 2018021300, dns_authorities_0_soa_refresh: 180, dns_authorities_0_soa_retry: 180, dns_authorities_0_soa_expire: 1209600, dns_authorities_0_soa_minimum: 60 ; pcap_cnt: 4322124, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 10963, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: sumo.external.zlb.scl3.mozilla.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: mozilla.com, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 60, dns_authorities_0_soa_mname: ns.mozilla.org, dns_authorities_0_soa_rname: sysadmins.mozilla.org, dns_authorities_0_soa_serial: 2018021300, dns_authorities_0_soa_refresh: 180, dns_authorities_0_soa_retry: 180, dns_authorities_0_soa_expire: 1209600, dns_authorities_0_soa_minimum: 60
null
BENIGN
false
12:30:41.266531
281,041
Wednesday-14-02-2018
[]
721
1,760
172.31.68.25-31.13.65.36-49708-443-6
[ "rdp", "rdp" ]
pcap_cnt: 2092780, event_type: rdp, proto: TCP, rdp_tx_id: 0, rdp_event_type: initial_request, rdp_cookie: Administr ; pcap_cnt: 2092781, event_type: rdp, proto: TCP, rdp_tx_id: 1, rdp_event_type: initial_response, rdp_server_supports_0: extended_client_data, rdp_server_supports_1: dynvc_gfx, rdp_server_supports_2: restricted_admin, rdp_server_supports_3: redirected_authentication, rdp_protocol: hybrid
null
BENIGN
false
12:30:41.411662
196,851
Wednesday-14-02-2018
[ { "alert": { "action": "allowed", "category": "Generic Protocol Command Decode", "gid": 1, "metadata": { "affected_product": null, "attack_target": null, "confidence": null, "created_at": [ "2011_04_22" ], "cve": null, "deployment": null, "former_category": null, "malware_family": null, "performance_impact": null, "reviewed_at": null, "signature_severity": null, "tag": null, "updated_at": [ "2011_04_22" ] }, "rev": 5, "severity": 3, "signature": "ET POLICY MS Remote Desktop Administrator Login Request", "signature_id": 2012709, "source": null, "target": null }, "app_proto": null, "dest_ip": "172.31.65.39", "dest_port": 3389, "dns": null, "ether": { "dest_mac": "02:73:b2:12:a2:c4", "src_mac": "02:3f:d5:42:27:3c" }, "event_type": "alert", "files": null, "flow": { "bytes_toclient": 66, "bytes_toserver": 221, "pkts_toclient": 1, "pkts_toserver": 3, "start": "2018-02-14T16:18:21.200225+0000" }, "flow_id": 1578204545224225, "http": null, "metadata": null, "packet": "AnOyEqLEAj/VQic8CABFAgBXHg9AAGwGYPNNSFUOrB9BJ5u7DT0p4EGF+sc5oVAYAQCKFAAAAwAALyrgAAAAAABDb29raWU6IG1zdHNoYXNoPUFkbWluaXN0cg0KAQAIAAMAAAA=", "packet_info": { "linktype": 1 }, "payload": "AwAALyrgAAAAAABDb29raWU6IG1zdHNoYXNoPUFkbWluaXN0cg0KAQAIAAMAAAA=", "payload_printable": ".../*......Cookie: mstshash=Administr\r\n........", "pcap_cnt": 2092779, "proto": "TCP", "rdp": null, "sip": null, "smb": null, "snmp": null, "src_ip": "77.72.85.14", "src_port": 39867, "ssh": null, "stream": 0, "timestamp": "2018-02-14T16:18:21.541137+0000", "tx_id": null }, { "alert": { "action": "allowed", "category": "Misc activity", "gid": 1, "metadata": { "affected_product": null, "attack_target": [ "Client_and_Server" ], "confidence": [ "Medium" ], "created_at": [ "2010_07_30" ], "cve": null, "deployment": [ "Perimeter" ], "former_category": [ "INFO" ], "malware_family": null, "performance_impact": [ "Significant" ], "reviewed_at": null, "signature_severity": [ "Informational" ], "tag": null, "updated_at": [ "2023_04_25" ] }, "rev": 10, "severity": 3, "signature": "ET INFO RDP - Response To External Host", "signature_id": 2001330, "source": { "ip": "77.72.85.14", "port": 39867 }, "target": { "ip": "172.31.65.39", "port": 3389 } }, "app_proto": "rdp", "dest_ip": "77.72.85.14", "dest_port": 39867, "dns": null, "ether": { "dest_mac": "02:3f:d5:42:27:3c", "src_mac": "02:73:b2:12:a2:c4" }, "event_type": "alert", "files": null, "flow": { "bytes_toclient": 139, "bytes_toserver": 221, "pkts_toclient": 2, "pkts_toserver": 3, "start": "2018-02-14T16:18:21.200225+0000" }, "flow_id": 1578204545224225, "http": null, "metadata": null, "packet": "Aj/VQic8AnOyEqLECABFAgA7QFdAAIAGAACsH0EnTUhVDg09m7v6xzmhKeBBtFAY+dGPygAAAwAAEw7QAAASNAACHwgAAgAAAA==", "packet_info": { "linktype": 1 }, "payload": "AwAAEw7QAAASNAACHwgAAgAAAA==", "payload_printable": ".........4.........", "pcap_cnt": 2092780, "proto": "TCP", "rdp": { "cookie": "Administr", "event_type": "initial_request", "protocol": null, "server_supports": null, "tx_id": 0 }, "sip": null, "smb": null, "snmp": null, "src_ip": "172.31.65.39", "src_port": 3389, "ssh": null, "stream": 0, "timestamp": "2018-02-14T16:18:21.544022+0000", "tx_id": null }, { "alert": { "action": "allowed", "category": "Generic Protocol Command Decode", "gid": 1, "metadata": { "affected_product": null, "attack_target": null, "confidence": null, "created_at": [ "2011_04_22" ], "cve": null, "deployment": null, "former_category": null, "malware_family": null, "performance_impact": null, "reviewed_at": null, "signature_severity": null, "tag": null, "updated_at": [ "2011_04_22" ] }, "rev": 5, "severity": 3, "signature": "ET POLICY MS Remote Desktop Administrator Login Request", "signature_id": 2012709, "source": null, "target": null }, "app_proto": "rdp", "dest_ip": "172.31.65.39", "dest_port": 3389, "dns": null, "ether": { "dest_mac": "02:73:b2:12:a2:c4", "src_mac": "02:3f:d5:42:27:3c" }, "event_type": "alert", "files": null, "flow": { "bytes_toclient": 836, "bytes_toserver": 2228, "pkts_toclient": 8, "pkts_toserver": 15, "start": "2018-02-14T16:18:21.200225+0000" }, "flow_id": 1578204545224225, "http": null, "metadata": null, "packet": "AnOyEqLEAj/VQic8CABFAAAoHn1AAGwGYLZNSFUOrB9BJ5u7DT0p4EcD+sdChVARAP/IDgAA", "packet_info": { "linktype": 1 }, "payload": "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", "payload_printable": ".../*......Cookie: mstshash=Administr\r\n...................Z.aN...$J....\\.`.......9.u...M.a..4.(.'.........9.3.....=.<.5./.,.+.$.#.\[email protected].\n.....5.\n...............\r.......................#.......................!6....%......vVA.e>...[Tk_jB...$....fT..~.9........EW...t/aC.......1{..-...f..5F.....Z.`.c.w...'z...2YM.{I>S.nU....y5.j2.W.I....s............ITa..M.K...Z.m...>X.Ik....4...%2...K....%.(CC.tEVf.5.....+.)...2....F..oaF%..l..\"...$Af..(.....*E..D..B\\@[.O....!...........(.........^1zU.(./....._].I~.).Z[....0w.A....Q........~...d.......]a.....f......p......\r...I...-....f..C.{f.\\..k.-*...y.|.X..'...............:..b_.........f@..\rZug.8.fD...*.j.K...F9.v.i..\"....`....... .. &..>T.c=U.'e}....*....\\.d.?..........BW.m..A .Jb...o........D...:......e....&...L..U.H...+.e.X/[email protected]..>.F5..cJ.Z.2.X*;.bp...{...U\\{@....,...o.......K...#...E.@&..#.W......l..ds....(..Wy....Q...lR.6.(}.X...{......e%ZZ.0...T.S......3}.&.....a.eq.[..;r..t.M~..S..n........B.[#....f....A.1\\...X........p.#....5i....=A}&.+_s....9.E....=.........C.........:q8...._!.4..O..........19>A..\".i.\nVO.;NT.t9\r..>.T....#_..M.=....X..C1.c2f.|R..\rv.........j.....%Jt..j.=LQ..\ne=...~Z..X(...7.y2[j.}..1.o.PS....W.]9..+p............yeH...'.).7..R...:.h....95].....yd....=.e. t..o8D..F$e...S\"Y..tG...Ss._-.i..-........$Pu.....=.........Z..q...\"dR.B*......J..R.x.}..S.-..w.3.^.e.O..6..FnC.....!..........s.......;f3.t..:I..\\.\"w", "pcap_cnt": 2092800, "proto": "TCP", "rdp": null, "sip": null, "smb": null, "snmp": null, "src_ip": "77.72.85.14", "src_port": 39867, "ssh": null, "stream": 1, "timestamp": "2018-02-14T16:18:25.496382+0000", "tx_id": null }, { "alert": { "action": "allowed", "category": "Misc activity", "gid": 1, "metadata": { "affected_product": null, "attack_target": [ "Client_and_Server" ], "confidence": [ "Medium" ], "created_at": [ "2010_07_30" ], "cve": null, "deployment": [ "Perimeter" ], "former_category": [ "INFO" ], "malware_family": null, "performance_impact": [ "Significant" ], "reviewed_at": null, "signature_severity": [ "Informational" ], "tag": null, "updated_at": [ "2023_04_25" ] }, "rev": 10, "severity": 3, "signature": "ET INFO RDP - Response To External Host", "signature_id": 2001330, "source": { "ip": "77.72.85.14", "port": 39867 }, "target": { "ip": "172.31.65.39", "port": 3389 } }, "app_proto": "rdp", "dest_ip": "77.72.85.14", "dest_port": 39867, "dns": null, "ether": { "dest_mac": "02:3f:d5:42:27:3c", "src_mac": "02:73:b2:12:a2:c4" }, "event_type": "alert", "files": null, "flow": { "bytes_toclient": 890, "bytes_toserver": 2228, "pkts_toclient": 9, "pkts_toserver": 15, "start": "2018-02-14T16:18:21.200225+0000" }, "flow_id": 1578204545224225, "http": null, "metadata": null, "packet": "Aj/VQic8AnOyEqLECABFAAAoQGFAAIAGAACsH0EnTUhVDg09m7v6x0KFKeBHBFAQ9IKPtwAA", "packet_info": { "linktype": 1 }, "payload": "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", "payload_printable": ".........4...................(........*...fU.....WZ.5..}%..d.5kc.c.+d..............uN.DF.........q.....=s..}......8'.....W..N..M..(.....n.E.?......,.\n.9*.d.H.&.y....>b....A.e.+.g.9#.M....:i=..).......r...@p\"4...Z2T.....Vu..89:.,..v...P...m...\r.zhm..._J..O................%a..*H.A...Vg.#..7x.p1&..y.{.S..LI...&f1..z8..}./.8....!9...r.......\r.M..F...i.........................]\"...\rJp..@.[N.Ag.", "pcap_cnt": 2092801, "proto": "TCP", "rdp": null, "sip": null, "smb": null, "snmp": null, "src_ip": "172.31.65.39", "src_port": 3389, "ssh": null, "stream": 1, "timestamp": "2018-02-14T16:18:25.496415+0000", "tx_id": null } ]
158
1,761
172.31.68.25-23.218.62.30-49709-443-6
[ "flow", "tls" ]
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 9, flow_pkts_toclient: 11, flow_bytes_toserver: 1007, flow_bytes_toclient: 8205, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: df, tcp_tcp_flags_ts: df, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_ecn: True, tcp_cwr: True, tcp_state: last_ack ; pcap_cnt: 2084288, event_type: tls, proto: TCP, tls_subject: C=US, ST=California, L=San Francisco, O=Fastly, Inc., CN=f3.shared.global.fastly.net, tls_issuerdn: C=BE, O=GlobalSign nv-sa, CN=GlobalSign CloudSSL CA - SHA256 - G3, tls_serial: 1E:E3:5C:C3:4B:8A:09:33:8B:62:4B:E2, tls_fingerprint: 99:8f:20:bd:3e:e6:51:81:e4:e1:79:01:a2:b2:d5:12:98:79:b5:84, tls_sni: f.vimeocdn.com, tls_version: TLS 1.2, tls_notbefore: 2017-12-12T15:09:11, tls_notafter: 2018-05-04T17:43:40
false
BENIGN
false
12:30:41.429149
756,872
Wednesday-14-02-2018
[]
415
1,762
172.31.68.25-23.218.62.30-49710-443-6
[ "flow", "tls" ]
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 8, flow_pkts_toclient: 6, flow_bytes_toserver: 1237, flow_bytes_toclient: 599, flow_age: 1, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: df, tcp_tcp_flags_ts: df, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_ecn: True, tcp_cwr: True, tcp_state: last_ack ; pcap_cnt: 2085861, event_type: tls, proto: TCP, tls_session_resumed: True, tls_sni: googleads.g.doubleclick.net, tls_version: TLS 1.2
false
BENIGN
false
12:30:41.442855
742,874
Wednesday-14-02-2018
[]
224
1,763
172.31.68.25-23.218.62.30-49711-443-6
[ "flow" ]
event_type: flow, proto: TCP, flow_pkts_toserver: 1, flow_pkts_toclient: 0, flow_bytes_toserver: 58, flow_bytes_toclient: 0, flow_age: 0, flow_state: new, flow_reason: timeout, tcp_tcp_flags: 02, tcp_tcp_flags_ts: 02, tcp_tcp_flags_tc: 00, tcp_syn: True, tcp_state: syn_sent
false
BENIGN
false
12:30:41.446455
976,336
Wednesday-14-02-2018
[]
116
1,764
172.31.68.25-23.36.32.162-49712-443-6
[ "flow", "dhcp", "dhcp" ]
event_type: flow, proto: UDP, app_proto: dhcp, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 357, flow_bytes_toclient: 344, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2096199, event_type: dhcp, proto: UDP, dhcp_type: request, dhcp_id: 2572909641, dhcp_client_mac: 02:73:b2:12:a2:c4, dhcp_assigned_ip: 0.0.0.0, dhcp_client_ip: 172.31.65.39, dhcp_dhcp_type: request, dhcp_client_id: 02:73:b2:12:a2:c4, dhcp_hostname: EC2AMAZ-O4EL3NG, dhcp_params_0: subnet_mask, dhcp_params_1: router, dhcp_params_2: dns_server, dhcp_params_3: domain ; pcap_cnt: 2096200, event_type: dhcp, proto: UDP, dhcp_type: reply, dhcp_id: 2572909641, dhcp_client_mac: 02:73:b2:12:a2:c4, dhcp_assigned_ip: 172.31.65.39, dhcp_client_ip: 172.31.65.39, dhcp_relay_ip: 0.0.0.0, dhcp_next_server_ip: 0.0.0.0, dhcp_dhcp_type: ack, dhcp_lease_time: 3600, dhcp_subnet_mask: 255.255.255.128, dhcp_routers_0: 172.31.65.1, dhcp_dns_servers_0: 172.31.0.2
false
BENIGN
false
12:30:41.500650
933,802
Wednesday-14-02-2018
[]
457
1,765
172.31.68.25-94.31.29.64-49713-443-6
[ "http", "fileinfo", "fileinfo" ]
pcap_cnt: 2084074, event_type: http, proto: TCP, tx_id: 0, http_hostname: ocsp.comodoca.com, http_url: /, http_http_user_agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:58.0) Gecko/20100101 Firefox/58.0, http_http_content_type: application/ocsp-response, http_http_method: POST, http_protocol: HTTP/1.1, http_status: 200, http_length: 472 ; pcap_cnt: 2084074, event_type: fileinfo, proto: TCP, http_hostname: ocsp.comodoca.com, http_url: /, http_http_user_agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:58.0) Gecko/20100101 Firefox/58.0, http_http_content_type: application/ocsp-response, http_http_method: POST, http_protocol: HTTP/1.1, http_status: 200, http_length: 472, app_proto: http, fileinfo_filename: /, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 84, fileinfo_tx_id: 0 ; pcap_cnt: 2084091, event_type: fileinfo, proto: TCP, http_hostname: ocsp.comodoca.com, http_url: /, http_http_user_agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:58.0) Gecko/20100101 Firefox/58.0, http_http_content_type: application/ocsp-response, http_http_method: POST, http_protocol: HTTP/1.1, http_status: 200, http_length: 472, app_proto: http, fileinfo_filename: /, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 472, fileinfo_tx_id: 0
null
BENIGN
false
12:30:41.613540
26,765
Wednesday-14-02-2018
[]
509
1,767
172.31.68.25-172.31.0.2-64131-53-17
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 94, flow_bytes_toclient: 110, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2095792, event_type: dns, proto: UDP, dns_type: query, dns_id: 28396, dns_rrname: sumo.external.zlb.scl3.mozilla.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 2095793, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 28396, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: sumo.external.zlb.scl3.mozilla.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: sumo.external.zlb.scl3.mozilla.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 60, dns_answers_0_rdata: 63.245.213.32, dns_grouped_A_0: 63.245.213.32
false
BENIGN
false
12:30:41.616176
1,294
Wednesday-14-02-2018
[]
360
1,768
172.31.68.25-23.111.9.32-49714-443-6
[ "dns", "dns" ]
pcap_cnt: 2083951, event_type: dns, proto: UDP, dns_type: query, dns_id: 28919, dns_rrname: pagead46.l.doubleclick.net, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 2083953, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 28919, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: pagead46.l.doubleclick.net, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: pagead46.l.doubleclick.net, dns_answers_0_rrtype: AAAA, dns_answers_0_ttl: 60, dns_answers_0_rdata: 2607:f8b0:4004:0810:0000:0000:0000:2002, dns_grouped_AAAA_0: 2607:f8b0:4004:0810:0000:0000:0000:2002
null
BENIGN
false
12:30:41.646111
146,907
Wednesday-14-02-2018
[]
296
1,769
172.31.68.25-172.31.0.2-60552-53-17
[ "flow" ]
event_type: flow, proto: TCP, flow_pkts_toserver: 1, flow_pkts_toclient: 0, flow_bytes_toserver: 74, flow_bytes_toclient: 0, flow_age: 0, flow_state: new, flow_reason: timeout, tcp_tcp_flags: 02, tcp_tcp_flags_ts: 02, tcp_tcp_flags_tc: 00, tcp_syn: True, tcp_state: syn_sent
false
BENIGN
false
12:30:41.784289
478
Wednesday-14-02-2018
[]
116
1,770
172.31.68.25-172.31.0.2-63055-53-17
[ "flow", "dns", "dns" ]
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 80, flow_bytes_toclient: 132, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2089964, event_type: dns, proto: UDP, dns_type: query, dns_id: 59734, dns_rrname: fonts.googleapis.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 2089969, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 59734, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: fonts.googleapis.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: fonts.googleapis.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 60, dns_answers_0_rdata: googleadapis.l.google.com, dns_answers_1_rrname: googleadapis.l.google.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 60, dns_answers_1_rdata: 209.85.203.95, dns_grouped_A_0: 209.85.203.95, dns_grouped_CNAME_0: googleadapis.l.google.com
false
BENIGN
false
12:30:41.785463
892
Wednesday-14-02-2018
[]
435
1,771