log
stringlengths
195
2.49k
label
int64
0
1
class
stringclasses
12 values
response
stringclasses
12 values
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 160, flow_bytes_toclient: 314, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2176256, event_type: dns, proto: UDP, dns_type: query, dns_id: 9808, dns_rrname: static.360buyimg.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 2176257, event_type: dns, proto: UDP, dns_type: query, dns_id: 9808, dns_rrname: static.360buyimg.com, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 2176288, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 9808, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: static.360buyimg.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: static.360buyimg.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 131, dns_answers_0_rdata: www.jdcdn.com, dns_answers_1_rrname: www.jdcdn.com, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 569, dns_answers_1_rdata: cs803.wac.systemcdn.net, dns_answers_2_rrname: cs803.wac.systemcdn.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 117, dns_answers_2_rdata: 192.229.173.173, dns_grouped_CNAME_0: www.jdcdn.com, dns_grouped_CNAME_1: cs803.wac.systemcdn.net, dns_grouped_A_0: 192.229.173.173 ; pcap_cnt: 2176289, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 9808, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: static.360buyimg.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: static.360buyimg.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 131, dns_answers_0_rdata: www.jdcdn.com, dns_answers_1_rrname: www.jdcdn.com, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 569, dns_answers_1_rdata: cs803.wac.systemcdn.net, dns_answers_2_rrname: cs803.wac.systemcdn.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 117, dns_answers_2_rdata: 192.229.173.173, dns_grouped_CNAME_0: www.jdcdn.com, dns_grouped_CNAME_1: cs803.wac.systemcdn.net, dns_grouped_A_0: 192.229.173.173
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 12, flow_pkts_toclient: 12, flow_bytes_toserver: 2240, flow_bytes_toclient: 7122, flow_age: 6, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 2190118, event_type: tls, proto: TCP, tls_subject: C=US, ST=California, L=Playa Vista, O=The Rubicon Project, Inc., CN=*.rubiconproject.com, tls_issuerdn: C=US, O=DigiCert Inc, CN=DigiCert SHA2 Secure Server CA, tls_serial: 0D:B5:FD:B6:78:66:79:56:92:75:50:B9:87:91:89:F4, tls_fingerprint: 3b:3b:75:25:65:4a:a5:df:51:cd:cf:99:43:33:de:61:e5:df:55:b5, tls_sni: fastlane.rubiconproject.com, tls_version: TLS 1.2, tls_notbefore: 2016-01-12T00:00:00, tls_notafter: 2019-03-01T12:00:00
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 10, flow_pkts_toclient: 9, flow_bytes_toserver: 1145, flow_bytes_toclient: 5077, flow_age: 5, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 2191124, event_type: tls, proto: TCP, tls_subject: C=US, OID(2.5.4.17)=94063, ST=CA, L=Redwood, O=PubMatic, Inc., OU=PubMatic, OU=PlatinumSSL Wildcard, CN=*.pubmatic.com, tls_issuerdn: C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Organization Validation Secure Server CA, tls_serial: 00:A6:1B:5A:5D:7B:59:49:1E:1A:B3:97:8E:65:D4:31:00, tls_fingerprint: b3:fe:9d:9e:62:1e:b8:03:8b:c4:2c:67:72:7c:34:6e:75:4b:cc:86, tls_sni: gads.pubmatic.com, tls_version: TLS 1.2, tls_notbefore: 2016-04-12T00:00:00, tls_notafter: 2019-05-27T23:59:59
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 158, flow_bytes_toclient: 346, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2190900, event_type: dns, proto: UDP, dns_type: query, dns_id: 31472, dns_rrname: dtm.advertising.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 2190901, event_type: dns, proto: UDP, dns_type: query, dns_id: 31472, dns_rrname: dtm.advertising.com, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 2190959, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 31472, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: dtm.advertising.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: dtm.advertising.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 24, dns_answers_0_rdata: dtm.advertising.com.edgekey.net, dns_answers_1_rrname: dtm.advertising.com.edgekey.net, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 15359, dns_answers_1_rdata: e9669.g.akamaiedge.net, dns_answers_2_rrname: e9669.g.akamaiedge.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 19, dns_answers_2_rdata: 23.194.182.12, dns_grouped_A_0: 23.194.182.12, dns_grouped_CNAME_0: dtm.advertising.com.edgekey.net, dns_grouped_CNAME_1: e9669.g.akamaiedge.net ; pcap_cnt: 2190960, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 31472, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: dtm.advertising.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: dtm.advertising.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 24, dns_answers_0_rdata: dtm.advertising.com.edgekey.net, dns_answers_1_rrname: dtm.advertising.com.edgekey.net, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 15359, dns_answers_1_rdata: e9669.g.akamaiedge.net, dns_answers_2_rrname: e9669.g.akamaiedge.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 19, dns_answers_2_rdata: 23.194.182.12, dns_grouped_CNAME_0: dtm.advertising.com.edgekey.net, dns_grouped_CNAME_1: e9669.g.akamaiedge.net, dns_grouped_A_0: 23.194.182.12
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 234, flow_bytes_toclient: 385, flow_age: 116, flow_state: established, flow_reason: timeout ; pcap_cnt: 2193232, event_type: dns, proto: UDP, dns_type: query, dns_id: 56426, dns_rrname: pr-bh.ybp.gysm.yahoodns.net, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 2193244, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 56426, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: pr-bh.ybp.gysm.yahoodns.net, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: gysm.yahoodns.net, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 237, dns_authorities_0_soa_mname: yf1.yahoo.com, dns_authorities_0_soa_rname: hostmaster.yahoo-inc.com, dns_authorities_0_soa_serial: 1499084595, dns_authorities_0_soa_refresh: 30, dns_authorities_0_soa_retry: 30, dns_authorities_0_soa_expire: 86400, dns_authorities_0_soa_minimum: 300 ; pcap_cnt: 2229579, event_type: dns, proto: UDP, dns_type: query, dns_id: 51000, dns_rrname: ttd-uswest-match-adsrvr-org-454816348.us-west-1.elb.amazonaws.com, dns_rrtype: AAAA, dns_tx_id: 2 ; pcap_cnt: 2229585, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 51000, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: ttd-uswest-match-adsrvr-org-454816348.us-west-1.elb.amazonaws.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: us-west-1.elb.amazonaws.com, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 5, dns_authorities_0_soa_mname: ns-699.awsdns-23.net, dns_authorities_0_soa_rname: awsdns-hostmaster.amazon.com, dns_authorities_0_soa_serial: 1, dns_authorities_0_soa_refresh: 7200, dns_authorities_0_soa_retry: 900, dns_authorities_0_soa_expire: 1209600, dns_authorities_0_soa_minimum: 60
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 19, flow_pkts_toclient: 18, flow_bytes_toserver: 2950, flow_bytes_toclient: 2143, flow_age: 121, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 2206028, event_type: http, proto: TCP, tx_id: 0, http_hostname: rtb-csync.smartadserver.com, http_url: /redir/?issi=1&partnerid=66&partneruserid=00b710F70a12ec85215d1105, http_http_user_agent: Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:54.0) Gecko/20100101 Firefox/54.0, http_http_content_type: image/gif, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 43 ; pcap_cnt: 2210158, event_type: fileinfo, proto: TCP, http_hostname: rtb-csync.smartadserver.com, http_url: /redir/?issi=1&partnerid=66&partneruserid=00b710F70a12ec85215d1105, http_http_user_agent: Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:54.0) Gecko/20100101 Firefox/54.0, http_http_content_type: image/gif, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 43, app_proto: http, fileinfo_filename: /redir/, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 43, fileinfo_tx_id: 0 ; pcap_cnt: 2210160, event_type: http, proto: TCP, tx_id: 1, http_hostname: rtb-csync.smartadserver.com, http_url: /redir/?issi=1&partnerid=66&partneruserid=00b710F7bcc0eeca8b8208fa, http_http_user_agent: Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:54.0) Gecko/20100101 Firefox/54.0, http_http_content_type: image/gif, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 43 ; pcap_cnt: 2213531, event_type: fileinfo, proto: TCP, http_hostname: rtb-csync.smartadserver.com, http_url: /redir/?issi=1&partnerid=66&partneruserid=00b710F7bcc0eeca8b8208fa, http_http_user_agent: Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:54.0) Gecko/20100101 Firefox/54.0, http_http_content_type: image/gif, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 43, app_proto: http, fileinfo_filename: /redir/, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 43, fileinfo_tx_id: 1
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 11, flow_pkts_toclient: 9, flow_bytes_toserver: 1419, flow_bytes_toclient: 5165, flow_age: 12, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 2207269, event_type: tls, proto: TCP, tls_subject: C=US, ST=New York, L=New York, O=Vindico LLC, CN=*.vindicosuite.com, tls_issuerdn: C=US, O=DigiCert Inc, CN=DigiCert SHA2 Secure Server CA, tls_serial: 05:9D:A3:4B:B8:A9:06:69:46:21:4D:D6:17:44:0A:65, tls_fingerprint: f1:75:25:b6:39:76:c6:2a:98:16:5e:78:e0:65:80:e6:24:36:a2:a3, tls_sni: mpp.vindicosuite.com, tls_version: TLS 1.2, tls_notbefore: 2014-08-11T00:00:00, tls_notafter: 2017-08-15T12:00:00
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 48, flow_pkts_toclient: 92, flow_bytes_toserver: 4840, flow_bytes_toclient: 101902, flow_age: 185, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 2211235, event_type: tls, proto: TCP, tls_subject: C=US, ST=California, L=Mountain View, O=Google Inc, CN=*.apis.google.com, tls_issuerdn: C=US, O=Google Inc, CN=Google Internet Authority G2, tls_serial: 04:56:1A:C9:B7:B1:C1:B9, tls_fingerprint: 8d:ae:35:63:aa:a8:e3:92:b8:03:eb:bd:48:75:b8:40:9d:bd:46:47, tls_sni: apis.google.com, tls_version: TLS 1.2, tls_notbefore: 2017-06-21T13:52:00, tls_notafter: 2017-09-13T13:52:00
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 14, flow_pkts_toclient: 15, flow_bytes_toserver: 1754, flow_bytes_toclient: 6395, flow_age: 61, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 2214016, event_type: tls, proto: TCP, tls_session_resumed: True, tls_sni: redir.adap.tv, tls_version: TLS 1.2
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 178, flow_bytes_toclient: 210, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2214532, event_type: dns, proto: UDP, dns_type: query, dns_id: 6561, dns_rrname: cm.everesttech.net.akadns.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 2214533, event_type: dns, proto: UDP, dns_type: query, dns_id: 6561, dns_rrname: cm.everesttech.net.akadns.net, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 2214534, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 6561, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: cm.everesttech.net.akadns.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: cm.everesttech.net.akadns.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 298, dns_answers_0_rdata: 192.243.232.58, dns_grouped_A_0: 192.243.232.58 ; pcap_cnt: 2214535, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 6561, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: cm.everesttech.net.akadns.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: cm.everesttech.net.akadns.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 298, dns_answers_0_rdata: 192.243.232.58, dns_grouped_A_0: 192.243.232.58
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 160, flow_bytes_toclient: 264, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2218680, event_type: dns, proto: UDP, dns_type: query, dns_id: 41993, dns_rrname: fonts.googleapis.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 2218681, event_type: dns, proto: UDP, dns_type: query, dns_id: 41993, dns_rrname: fonts.googleapis.com, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 2218682, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 41993, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: fonts.googleapis.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: fonts.googleapis.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 865, dns_answers_0_rdata: googleadapis.l.google.com, dns_answers_1_rrname: googleadapis.l.google.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 7, dns_answers_1_rdata: 172.217.11.10, dns_grouped_A_0: 172.217.11.10, dns_grouped_CNAME_0: googleadapis.l.google.com ; pcap_cnt: 2218683, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 41993, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: fonts.googleapis.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: fonts.googleapis.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 865, dns_answers_0_rdata: googleadapis.l.google.com, dns_answers_1_rrname: googleadapis.l.google.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 7, dns_answers_1_rdata: 172.217.11.10, dns_grouped_A_0: 172.217.11.10, dns_grouped_CNAME_0: googleadapis.l.google.com
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 67, flow_pkts_toclient: 105, flow_bytes_toserver: 9166, flow_bytes_toclient: 128937, flow_age: 118, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 2218970, event_type: http, proto: TCP, tx_id: 0, http_hostname: www.conversantmedia.com, http_url: /sites/default/files/advagg_css/css__PdX-jPfNonX3vr6Xsf6J8txZplbenPiwShyRVNfiiGY__-i6I5PTxjwKRYCk98el6Az50PkqDCFM7u22CNvwMLbs__Iqi5WCvQKxyFUIcZsIgUS2NqwBKCKK4azoy_suRDsfw.css, http_http_user_agent: Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:31.0) Gecko/20100101 Firefox/31.0, http_http_content_type: text/css, http_http_refer: http://www.conversantmedia.com/, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 15617 ; event_type: fileinfo, proto: TCP, http_hostname: www.conversantmedia.com, http_url: /sites/default/files/advagg_css/css__PdX-jPfNonX3vr6Xsf6J8txZplbenPiwShyRVNfiiGY__-i6I5PTxjwKRYCk98el6Az50PkqDCFM7u22CNvwMLbs__Iqi5WCvQKxyFUIcZsIgUS2NqwBKCKK4azoy_suRDsfw.css, http_http_user_agent: Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:31.0) Gecko/20100101 Firefox/31.0, http_http_content_type: text/css, http_http_refer: http://www.conversantmedia.com/, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 15617, app_proto: http, fileinfo_filename: /sites/default/files/advagg_css/css__PdX-jPfNonX3vr6Xsf6J8txZplbenPiwShyRVNfiiGY__-i6I5PTxjwKRYCk98el6Az50PkqDCFM7u22CNvwMLbs__Iqi5WCvQKxyFUIcZsIgUS2NqwBKCKK4azoy_suRDsfw.css, fileinfo_gaps: False, fileinfo_state: TRUNCATED, fileinfo_stored: False, fileinfo_size: 72923, fileinfo_tx_id: 0
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 10, flow_pkts_toclient: 8, flow_bytes_toserver: 1249, flow_bytes_toclient: 719, flow_age: 5, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1f, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 2221707, event_type: tls, proto: TCP, tls_session_resumed: True, tls_sni: dtm.advertising.com, tls_version: TLS 1.2
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 152, flow_bytes_toclient: 184, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2220649, event_type: dns, proto: UDP, dns_type: query, dns_id: 60223, dns_rrname: ums.adtechus.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 2220650, event_type: dns, proto: UDP, dns_type: query, dns_id: 60223, dns_rrname: ums.adtechus.com, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 2220651, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 60223, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: ums.adtechus.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: ums.adtechus.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 26, dns_answers_0_rdata: 152.163.56.2, dns_grouped_A_0: 152.163.56.2 ; pcap_cnt: 2220652, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 60223, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: ums.adtechus.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: ums.adtechus.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 26, dns_answers_0_rdata: 152.163.56.2, dns_grouped_A_0: 152.163.56.2
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 131, flow_bytes_toclient: 213, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2229052, event_type: dns, proto: UDP, dns_type: query, dns_id: 26083, dns_rrname: nginx-prod-us-east-1-a-815169754.us-east-1.elb.amazonaws.com, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 2229053, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 26083, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: nginx-prod-us-east-1-a-815169754.us-east-1.elb.amazonaws.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: us-east-1.elb.amazonaws.com, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 46, dns_authorities_0_soa_mname: ns-1119.awsdns-11.org, dns_authorities_0_soa_rname: awsdns-hostmaster.amazon.com, dns_authorities_0_soa_serial: 1, dns_authorities_0_soa_refresh: 7200, dns_authorities_0_soa_retry: 900, dns_authorities_0_soa_expire: 1209600, dns_authorities_0_soa_minimum: 60
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 204, flow_bytes_toclient: 368, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2230915, event_type: dns, proto: UDP, dns_type: query, dns_id: 61636, dns_rrname: rtb-2070631988.us-east-1.elb.amazonaws.com, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 2230916, event_type: dns, proto: UDP, dns_type: query, dns_id: 61636, dns_rrname: rtb-2070631988.us-east-1.elb.amazonaws.com, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 2230967, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 61636, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: rtb-2070631988.us-east-1.elb.amazonaws.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: us-east-1.elb.amazonaws.com, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 43, dns_authorities_0_soa_mname: ns-1119.awsdns-11.org, dns_authorities_0_soa_rname: awsdns-hostmaster.amazon.com, dns_authorities_0_soa_serial: 1, dns_authorities_0_soa_refresh: 7200, dns_authorities_0_soa_retry: 900, dns_authorities_0_soa_expire: 1209600, dns_authorities_0_soa_minimum: 60 ; pcap_cnt: 2230968, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 61636, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: rtb-2070631988.us-east-1.elb.amazonaws.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: us-east-1.elb.amazonaws.com, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 43, dns_authorities_0_soa_mname: ns-1119.awsdns-11.org, dns_authorities_0_soa_rname: awsdns-hostmaster.amazon.com, dns_authorities_0_soa_serial: 1, dns_authorities_0_soa_refresh: 7200, dns_authorities_0_soa_retry: 900, dns_authorities_0_soa_expire: 1209600, dns_authorities_0_soa_minimum: 60
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 152, flow_bytes_toclient: 282, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2230767, event_type: dns, proto: UDP, dns_type: query, dns_id: 756, dns_rrname: geo-um.btrll.com, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 2230768, event_type: dns, proto: UDP, dns_type: query, dns_id: 756, dns_rrname: geo-um.btrll.com, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 2230827, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 756, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: geo-um.btrll.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: btrll.com, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 29, dns_authorities_0_soa_mname: ns1.p02.dynect.net, dns_authorities_0_soa_rname: hostmaster.btrll.com, dns_authorities_0_soa_serial: 1499072939, dns_authorities_0_soa_refresh: 3600, dns_authorities_0_soa_retry: 600, dns_authorities_0_soa_expire: 604800, dns_authorities_0_soa_minimum: 60 ; pcap_cnt: 2230828, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 756, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: geo-um.btrll.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: btrll.com, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 29, dns_authorities_0_soa_mname: ns1.p02.dynect.net, dns_authorities_0_soa_rname: hostmaster.btrll.com, dns_authorities_0_soa_serial: 1499072939, dns_authorities_0_soa_refresh: 3600, dns_authorities_0_soa_retry: 600, dns_authorities_0_soa_expire: 604800, dns_authorities_0_soa_minimum: 60
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 22, flow_pkts_toclient: 21, flow_bytes_toserver: 4720, flow_bytes_toclient: 5598, flow_age: 116, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1f, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 2293439, event_type: tls, proto: TCP, tls_sni: v2datalakeb2wio-a.akamaihd.net, tls_version: UNDETERMINED
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 22, flow_pkts_toclient: 21, flow_bytes_toserver: 2439, flow_bytes_toclient: 6320, flow_age: 180, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 2293678, event_type: tls, proto: TCP, tls_subject: C=US, ST=California, L=Mountain View, O=Google Inc, CN=*.doubleclick.net, tls_issuerdn: C=US, O=Google Inc, CN=Google Internet Authority G2, tls_serial: 6E:BD:B3:0B:6B:44:1C:0E, tls_fingerprint: e3:23:82:ce:3a:35:55:37:e9:32:1a:37:85:44:d1:40:44:dc:0f:ab, tls_sni: 4662445.fls.doubleclick.net, tls_version: TLS 1.2, tls_notbefore: 2017-06-21T14:07:24, tls_notafter: 2017-09-13T13:52:00
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 31, flow_pkts_toclient: 36, flow_bytes_toserver: 4984, flow_bytes_toclient: 12613, flow_age: 141, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 2293739, event_type: tls, proto: TCP, tls_subject: C=BR, ST=SP, L=Sao Paulo, OU=TI, O=Clear Sale, CN=*.clearsale.com.br, tls_issuerdn: C=BE, O=GlobalSign nv-sa, CN=GlobalSign Organization Validation CA - SHA256 - G2, tls_serial: 41:79:B4:2D:96:A5:0B:A3:DB:7C:E6:75, tls_fingerprint: ac:68:76:95:cc:8e:63:1b:c1:2c:c2:f4:19:06:40:8a:d6:90:fd:11, tls_sni: device.clearsale.com.br, tls_version: TLS 1.2, tls_notbefore: 2016-06-17T18:12:52, tls_notafter: 2017-08-27T23:59:59
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 9, flow_pkts_toclient: 7, flow_bytes_toserver: 905, flow_bytes_toclient: 646, flow_age: 6, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1f, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 2298964, event_type: tls, proto: TCP, tls_session_resumed: True, tls_sni: versioncheck-bg.addons.mozilla.org, tls_version: TLS 1.2
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 3, flow_pkts_toclient: 3, flow_bytes_toserver: 1553, flow_bytes_toclient: 1537, flow_age: 1, flow_state: established, flow_reason: timeout
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 76, flow_bytes_toclient: 151, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2308749, event_type: dns, proto: UDP, dns_type: query, dns_id: 27106, dns_rrname: local, dns_rrtype: SOA, dns_tx_id: 0 ; pcap_cnt: 2308750, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 27106, dns_flags: 8183, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: local, dns_rrtype: SOA, dns_rcode: NXDOMAIN, dns_authorities_0_rrname: , dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 64164, dns_authorities_0_soa_mname: a.root-servers.net, dns_authorities_0_soa_rname: nstld.verisign-grs.com, dns_authorities_0_soa_serial: 2017070300, dns_authorities_0_soa_refresh: 1800, dns_authorities_0_soa_retry: 900, dns_authorities_0_soa_expire: 604800, dns_authorities_0_soa_minimum: 86400
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 148, flow_bytes_toclient: 242, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2328415, event_type: dns, proto: UDP, dns_type: query, dns_id: 43450, dns_rrname: DC.Testbed1.ca, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 2328416, event_type: dns, proto: UDP, dns_type: query, dns_id: 43450, dns_rrname: DC.Testbed1.ca, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 2328419, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 43450, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: DC.Testbed1.ca, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: Testbed1.ca, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 3600, dns_authorities_0_soa_mname: DC.Testbed1.ca, dns_authorities_0_soa_rname: hostmaster.Testbed1.ca, dns_authorities_0_soa_serial: 57, dns_authorities_0_soa_refresh: 900, dns_authorities_0_soa_retry: 600, dns_authorities_0_soa_expire: 86400, dns_authorities_0_soa_minimum: 3600 ; pcap_cnt: 2328420, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 43450, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: DC.Testbed1.ca, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: Testbed1.ca, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 3600, dns_authorities_0_soa_mname: DC.Testbed1.ca, dns_authorities_0_soa_rname: hostmaster.Testbed1.ca, dns_authorities_0_soa_serial: 57, dns_authorities_0_soa_refresh: 900, dns_authorities_0_soa_retry: 600, dns_authorities_0_soa_expire: 86400, dns_authorities_0_soa_minimum: 3600
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: failed, flow_pkts_toserver: 21, flow_pkts_toclient: 38, flow_bytes_toserver: 4576, flow_bytes_toclient: 46700, flow_age: 0, flow_state: established, flow_reason: timeout
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 23, flow_pkts_toclient: 19, flow_bytes_toserver: 2597, flow_bytes_toclient: 5798, flow_age: 117, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 2419027, event_type: tls, proto: TCP, tls_subject: C=US, ST=California, L=Mountain View, O=Google Inc, CN=*.google-analytics.com, tls_issuerdn: C=US, O=Google Inc, CN=Google Internet Authority G2, tls_serial: 34:D2:F0:3B:CD:EE:93:2C, tls_fingerprint: d8:b7:d7:92:f6:c0:59:78:7b:80:7d:52:ca:81:42:f1:0f:02:2d:77, tls_sni: www.google-analytics.com, tls_version: TLS 1.2, tls_notbefore: 2017-06-21T13:52:00, tls_notafter: 2017-09-13T13:52:00
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 11, flow_pkts_toclient: 9, flow_bytes_toserver: 1641, flow_bytes_toclient: 4745, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 2428826, event_type: tls, proto: TCP, tls_session_resumed: True, tls_sni: px.owneriq.net, tls_version: TLS 1.2
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 11, flow_pkts_toclient: 8, flow_bytes_toserver: 3303, flow_bytes_toclient: 4380, flow_age: 7, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 2547440, event_type: tls, proto: TCP, tls_sni: r.turn.com, tls_version: UNDETERMINED
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 6, flow_pkts_toclient: 6, flow_bytes_toserver: 914, flow_bytes_toclient: 521, flow_age: 13, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1f, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 2592281, event_type: tls, proto: TCP, tls_session_resumed: True, tls_sni: px.moatads.com, tls_version: TLS 1.2
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 4, flow_pkts_toclient: 2, flow_bytes_toserver: 344, flow_bytes_toclient: 302, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2591467, event_type: dns, proto: UDP, dns_type: query, dns_id: 38001, dns_rrname: 94.133.97.104.in-addr.arpa, dns_rrtype: PTR, dns_tx_id: 0 ; pcap_cnt: 2591468, event_type: dns, proto: UDP, dns_type: query, dns_id: 38001, dns_rrname: 94.133.97.104.in-addr.arpa, dns_rrtype: PTR, dns_tx_id: 1 ; pcap_cnt: 2591473, event_type: dns, proto: UDP, dns_type: query, dns_id: 38001, dns_rrname: 94.133.97.104.in-addr.arpa, dns_rrtype: PTR, dns_tx_id: 2 ; pcap_cnt: 2591474, event_type: dns, proto: UDP, dns_type: query, dns_id: 38001, dns_rrname: 94.133.97.104.in-addr.arpa, dns_rrtype: PTR, dns_tx_id: 3 ; pcap_cnt: 2591483, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 38001, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: 94.133.97.104.in-addr.arpa, dns_rrtype: PTR, dns_rcode: NOERROR, dns_answers_0_rrname: 94.133.97.104.in-addr.arpa, dns_answers_0_rrtype: PTR, dns_answers_0_ttl: 43199, dns_answers_0_rdata: a104-97-133-94.deploy.static.akamaitechnologies.com, dns_grouped_PTR_0: a104-97-133-94.deploy.static.akamaitechnologies.com ; pcap_cnt: 2591484, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 38001, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: 94.133.97.104.in-addr.arpa, dns_rrtype: PTR, dns_rcode: NOERROR, dns_answers_0_rrname: 94.133.97.104.in-addr.arpa, dns_answers_0_rrtype: PTR, dns_answers_0_ttl: 43199, dns_answers_0_rdata: a104-97-133-94.deploy.static.akamaitechnologies.com, dns_grouped_PTR_0: a104-97-133-94.deploy.static.akamaitechnologies.com
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 8, flow_pkts_toclient: 7, flow_bytes_toserver: 1117, flow_bytes_toclient: 4132, flow_age: 11, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 2596714, event_type: tls, proto: TCP, tls_subject: C=JP, OU=Domain Control Validated, CN=sync-dsp.ad-m.asia, tls_issuerdn: C=BE, O=GlobalSign nv-sa, CN=GlobalSign Domain Validation CA - SHA256 - G2, tls_serial: 43:1A:81:8D:B4:0C:F4:D3:AA:A1:2D:FF, tls_fingerprint: 8c:b8:7e:59:4b:5d:52:a2:d0:f7:27:aa:25:13:9e:fd:28:ee:33:70, tls_sni: sync-dsp.ad-m.asia, tls_version: TLS 1.2, tls_notbefore: 2017-05-01T04:31:13, tls_notafter: 2018-05-02T04:31:13
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 170, flow_bytes_toclient: 252, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2608706, event_type: dns, proto: UDP, dns_type: query, dns_id: 7514, dns_rrname: 65.3.197.209.in-addr.arpa, dns_rrtype: PTR, dns_tx_id: 0 ; pcap_cnt: 2608707, event_type: dns, proto: UDP, dns_type: query, dns_id: 7514, dns_rrname: 65.3.197.209.in-addr.arpa, dns_rrtype: PTR, dns_tx_id: 1 ; pcap_cnt: 2608979, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 7514, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: 65.3.197.209.in-addr.arpa, dns_rrtype: PTR, dns_rcode: NOERROR, dns_answers_0_rrname: 65.3.197.209.in-addr.arpa, dns_answers_0_rrtype: PTR, dns_answers_0_ttl: 471, dns_answers_0_rdata: vip0x041.map2.ssl.hwcdn.net, dns_grouped_PTR_0: vip0x041.map2.ssl.hwcdn.net ; pcap_cnt: 2608980, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 7514, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: 65.3.197.209.in-addr.arpa, dns_rrtype: PTR, dns_rcode: NOERROR, dns_answers_0_rrname: 65.3.197.209.in-addr.arpa, dns_answers_0_rrtype: PTR, dns_answers_0_ttl: 471, dns_answers_0_rdata: vip0x041.map2.ssl.hwcdn.net, dns_grouped_PTR_0: vip0x041.map2.ssl.hwcdn.net
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 13, flow_pkts_toclient: 12, flow_bytes_toserver: 2678, flow_bytes_toclient: 1802, flow_age: 115, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 2610918, event_type: tls, proto: TCP, tls_session_resumed: True, tls_sni: sy.eu.angsrvr.com, tls_version: TLS 1.2
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 166, flow_bytes_toclient: 222, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2611230, event_type: dns, proto: UDP, dns_type: query, dns_id: 19097, dns_rrname: youtube-ui.l.google.com, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 2611231, event_type: dns, proto: UDP, dns_type: query, dns_id: 19097, dns_rrname: youtube-ui.l.google.com, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 2611258, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 19097, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: youtube-ui.l.google.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: youtube-ui.l.google.com, dns_answers_0_rrtype: AAAA, dns_answers_0_ttl: 299, dns_answers_0_rdata: 2607:f8b0:4006:081a:0000:0000:0000:200e, dns_grouped_AAAA_0: 2607:f8b0:4006:081a:0000:0000:0000:200e ; pcap_cnt: 2611259, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 19097, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: youtube-ui.l.google.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: youtube-ui.l.google.com, dns_answers_0_rrtype: AAAA, dns_answers_0_ttl: 299, dns_answers_0_rdata: 2607:f8b0:4006:081a:0000:0000:0000:200e, dns_grouped_AAAA_0: 2607:f8b0:4006:081a:0000:0000:0000:200e
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 17, flow_pkts_toclient: 15, flow_bytes_toserver: 1551, flow_bytes_toclient: 2764, flow_age: 116, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 13, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 2614352, event_type: fileinfo, proto: TCP, http_hostname: gv.symcd.com, http_url: /, http_http_user_agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:31.0) Gecko/20100101 Firefox/31.0, http_http_method: POST, http_protocol: HTTP/1.1, http_length: 0, app_proto: http, fileinfo_filename: /, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 70, fileinfo_tx_id: 0 ; event_type: http, proto: TCP, tx_id: 0, http_hostname: gv.symcd.com, http_url: /, http_http_user_agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:31.0) Gecko/20100101 Firefox/31.0, http_http_method: POST, http_protocol: HTTP/1.1, http_length: 0
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 111, flow_bytes_toclient: 127, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2619174, event_type: dns, proto: UDP, dns_type: query, dns_id: 60330, dns_rrname: fontawesome-cdn.fonticons.netdna-cdn.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 2619192, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 60330, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: fontawesome-cdn.fonticons.netdna-cdn.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: fontawesome-cdn.fonticons.netdna-cdn.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 69, dns_answers_0_rdata: 198.232.124.196, dns_grouped_A_0: 198.232.124.196
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 9, flow_pkts_toclient: 9, flow_bytes_toserver: 1013, flow_bytes_toclient: 2695, flow_age: 46, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 13, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 2626582, event_type: fileinfo, proto: TCP, http_hostname: ocsp2.globalsign.com, http_url: /gsorganizationvalsha2g2, http_http_user_agent: Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:54.0) Gecko/20100101 Firefox/54.0, http_http_method: POST, http_protocol: HTTP/1.1, http_length: 0, app_proto: http, fileinfo_filename: /gsorganizationvalsha2g2, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 85, fileinfo_tx_id: 0 ; event_type: http, proto: TCP, tx_id: 0, http_hostname: ocsp2.globalsign.com, http_url: /gsorganizationvalsha2g2, http_http_user_agent: Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:54.0) Gecko/20100101 Firefox/54.0, http_http_method: POST, http_protocol: HTTP/1.1, http_length: 0
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 9, flow_pkts_toclient: 7, flow_bytes_toserver: 903, flow_bytes_toclient: 4136, flow_age: 5, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 2634539, event_type: tls, proto: TCP, tls_subject: C=US, ST=California, L=Mountain View, O=Mozilla Corporation, CN=firefox.settings.services.mozilla.com, tls_issuerdn: C=US, O=DigiCert Inc, CN=DigiCert SHA2 Secure Server CA, tls_serial: 01:28:92:4C:EB:01:93:C4:AD:FC:AF:4F:57:0B:D9:47, tls_fingerprint: 7d:7f:5d:ca:b5:99:00:0c:73:55:b5:cd:53:b7:a7:a1:15:38:fa:cd, tls_sni: firefox.settings.services.mozilla.com, tls_version: TLS 1.2, tls_notbefore: 2015-10-20T00:00:00, tls_notafter: 2017-10-24T12:00:00
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 7, flow_pkts_toclient: 7, flow_bytes_toserver: 752, flow_bytes_toclient: 4178, flow_age: 1, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 2635598, event_type: tls, proto: TCP, tls_subject: C=US, ST=CA, L=Sunnyvale, O=Yahoo! Inc., CN=*.btrll.com, tls_issuerdn: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert SHA2 High Assurance Server CA, tls_serial: 0F:E9:A8:BE:6F:FE:7D:F2:EE:20:7C:13:F1:B1:D6:81, tls_fingerprint: 75:e8:09:d6:3e:e9:d9:21:81:32:5d:ca:ec:5d:0c:b1:ad:a9:70:ea, tls_sni: vast.bp3868102.btrll.com, tls_version: TLS 1.2, tls_notbefore: 2017-04-26T00:00:00, tls_notafter: 2017-10-26T12:00:00
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 4, flow_pkts_toclient: 2, flow_bytes_toserver: 336, flow_bytes_toclient: 246, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2639263, event_type: dns, proto: UDP, dns_type: query, dns_id: 15208, dns_rrname: vast.bp3858284.btrll.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 2639264, event_type: dns, proto: UDP, dns_type: query, dns_id: 15208, dns_rrname: vast.bp3858284.btrll.com, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 2639287, event_type: dns, proto: UDP, dns_type: query, dns_id: 15208, dns_rrname: vast.bp3858284.btrll.com, dns_rrtype: A, dns_tx_id: 2 ; pcap_cnt: 2639288, event_type: dns, proto: UDP, dns_type: query, dns_id: 15208, dns_rrname: vast.bp3858284.btrll.com, dns_rrtype: A, dns_tx_id: 3 ; pcap_cnt: 2639301, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 15208, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: vast.bp3858284.btrll.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: vast.bp3858284.btrll.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 1, dns_answers_0_rdata: geo-rtas.btrll.com, dns_answers_1_rrname: geo-rtas.btrll.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 13, dns_answers_1_rdata: 162.208.20.178, dns_grouped_A_0: 162.208.20.178, dns_grouped_CNAME_0: geo-rtas.btrll.com ; pcap_cnt: 2639302, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 15208, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: vast.bp3858284.btrll.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: vast.bp3858284.btrll.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 1, dns_answers_0_rdata: geo-rtas.btrll.com, dns_answers_1_rrname: geo-rtas.btrll.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 13, dns_answers_1_rdata: 162.208.20.178, dns_grouped_A_0: 162.208.20.178, dns_grouped_CNAME_0: geo-rtas.btrll.com
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 7, flow_pkts_toclient: 6, flow_bytes_toserver: 752, flow_bytes_toclient: 4124, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 2658460, event_type: tls, proto: TCP, tls_session_resumed: True, tls_sni: vast.bp3859005.btrll.com, tls_version: TLS 1.2
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 7, flow_pkts_toclient: 7, flow_bytes_toserver: 748, flow_bytes_toclient: 4178, flow_age: 1, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 2660275, event_type: tls, proto: TCP, tls_subject: C=US, ST=CA, L=Sunnyvale, O=Yahoo! Inc., CN=*.btrll.com, tls_issuerdn: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert SHA2 High Assurance Server CA, tls_serial: 0F:E9:A8:BE:6F:FE:7D:F2:EE:20:7C:13:F1:B1:D6:81, tls_fingerprint: 75:e8:09:d6:3e:e9:d9:21:81:32:5d:ca:ec:5d:0c:b1:ad:a9:70:ea, tls_sni: vast.bp3858284.btrll.com, tls_version: TLS 1.2, tls_notbefore: 2017-04-26T00:00:00, tls_notafter: 2017-10-26T12:00:00
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 7, flow_pkts_toclient: 7, flow_bytes_toserver: 748, flow_bytes_toclient: 4178, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 2662306, event_type: tls, proto: TCP, tls_subject: C=US, ST=CA, L=Sunnyvale, O=Yahoo! Inc., CN=*.btrll.com, tls_issuerdn: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert SHA2 High Assurance Server CA, tls_serial: 0F:E9:A8:BE:6F:FE:7D:F2:EE:20:7C:13:F1:B1:D6:81, tls_fingerprint: 75:e8:09:d6:3e:e9:d9:21:81:32:5d:ca:ec:5d:0c:b1:ad:a9:70:ea, tls_sni: vast.bp3871512.btrll.com, tls_version: TLS 1.2, tls_notbefore: 2017-04-26T00:00:00, tls_notafter: 2017-10-26T12:00:00
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 7, flow_pkts_toclient: 7, flow_bytes_toserver: 752, flow_bytes_toclient: 4178, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 2662975, event_type: tls, proto: TCP, tls_subject: C=US, ST=CA, L=Sunnyvale, O=Yahoo! Inc., CN=*.btrll.com, tls_issuerdn: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert SHA2 High Assurance Server CA, tls_serial: 0F:E9:A8:BE:6F:FE:7D:F2:EE:20:7C:13:F1:B1:D6:81, tls_fingerprint: 75:e8:09:d6:3e:e9:d9:21:81:32:5d:ca:ec:5d:0c:b1:ad:a9:70:ea, tls_sni: vast.bp3858845.btrll.com, tls_version: TLS 1.2, tls_notbefore: 2017-04-26T00:00:00, tls_notafter: 2017-10-26T12:00:00
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 7, flow_pkts_toclient: 7, flow_bytes_toserver: 748, flow_bytes_toclient: 4178, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 2663702, event_type: tls, proto: TCP, tls_subject: C=US, ST=CA, L=Sunnyvale, O=Yahoo! Inc., CN=*.btrll.com, tls_issuerdn: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert SHA2 High Assurance Server CA, tls_serial: 0F:E9:A8:BE:6F:FE:7D:F2:EE:20:7C:13:F1:B1:D6:81, tls_fingerprint: 75:e8:09:d6:3e:e9:d9:21:81:32:5d:ca:ec:5d:0c:b1:ad:a9:70:ea, tls_sni: vast.bp3859005.btrll.com, tls_version: TLS 1.2, tls_notbefore: 2017-04-26T00:00:00, tls_notafter: 2017-10-26T12:00:00
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 7, flow_pkts_toclient: 7, flow_bytes_toserver: 752, flow_bytes_toclient: 4178, flow_age: 1, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 2671749, event_type: tls, proto: TCP, tls_subject: C=US, ST=CA, L=Sunnyvale, O=Yahoo! Inc., CN=*.btrll.com, tls_issuerdn: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert SHA2 High Assurance Server CA, tls_serial: 0F:E9:A8:BE:6F:FE:7D:F2:EE:20:7C:13:F1:B1:D6:81, tls_fingerprint: 75:e8:09:d6:3e:e9:d9:21:81:32:5d:ca:ec:5d:0c:b1:ad:a9:70:ea, tls_sni: vast.bp3859006.btrll.com, tls_version: TLS 1.2, tls_notbefore: 2017-04-26T00:00:00, tls_notafter: 2017-10-26T12:00:00
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 160, flow_bytes_toclient: 192, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2669368, event_type: dns, proto: UDP, dns_type: query, dns_id: 46726, dns_rrname: clients.l.google.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 2669369, event_type: dns, proto: UDP, dns_type: query, dns_id: 46726, dns_rrname: clients.l.google.com, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 2669371, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 46726, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: clients.l.google.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: clients.l.google.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 213, dns_answers_0_rdata: 172.217.12.174, dns_grouped_A_0: 172.217.12.174 ; pcap_cnt: 2669373, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 46726, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: clients.l.google.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: clients.l.google.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 213, dns_answers_0_rdata: 172.217.12.174, dns_grouped_A_0: 172.217.12.174
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 148, flow_bytes_toclient: 180, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2677643, event_type: dns, proto: UDP, dns_type: query, dns_id: 34396, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 2677644, event_type: dns, proto: UDP, dns_type: query, dns_id: 34396, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 2677647, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 34396, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: DC.Testbed1.ca, dns_answers_0_rrtype: A, dns_answers_0_ttl: 3600, dns_answers_0_rdata: 192.168.10.3, dns_grouped_A_0: 192.168.10.3 ; pcap_cnt: 2677648, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 34396, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: DC.Testbed1.ca, dns_answers_0_rrtype: A, dns_answers_0_ttl: 3600, dns_answers_0_rdata: 192.168.10.3, dns_grouped_A_0: 192.168.10.3
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 7, flow_pkts_toclient: 6, flow_bytes_toserver: 752, flow_bytes_toclient: 4124, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 2683958, event_type: tls, proto: TCP, tls_sni: vast.bp3871512.btrll.com, tls_version: UNDETERMINED
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 168, flow_bytes_toclient: 200, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2686558, event_type: dns, proto: UDP, dns_type: query, dns_id: 33775, dns_rrname: ksgfiona.hks.harvard.edu, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 2686559, event_type: dns, proto: UDP, dns_type: query, dns_id: 33775, dns_rrname: ksgfiona.hks.harvard.edu, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 2686560, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 33775, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: ksgfiona.hks.harvard.edu, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: ksgfiona.hks.harvard.edu, dns_answers_0_rrtype: A, dns_answers_0_ttl: 300, dns_answers_0_rdata: 128.103.253.56, dns_grouped_A_0: 128.103.253.56 ; pcap_cnt: 2686561, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 33775, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: ksgfiona.hks.harvard.edu, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: ksgfiona.hks.harvard.edu, dns_answers_0_rrtype: A, dns_answers_0_ttl: 300, dns_answers_0_rdata: 128.103.253.56, dns_grouped_A_0: 128.103.253.56
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 7, flow_pkts_toclient: 6, flow_bytes_toserver: 752, flow_bytes_toclient: 4124, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 2688804, event_type: tls, proto: TCP, tls_session_resumed: True, tls_sni: vast.bp3858844.btrll.com, tls_version: TLS 1.2
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 152, flow_bytes_toclient: 216, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2694061, event_type: dns, proto: UDP, dns_type: query, dns_id: 54558, dns_rrname: daisy.ubuntu.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 2694062, event_type: dns, proto: UDP, dns_type: query, dns_id: 54558, dns_rrname: daisy.ubuntu.com, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 2694063, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 54558, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: daisy.ubuntu.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: daisy.ubuntu.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 400, dns_answers_0_rdata: 162.213.33.133, dns_answers_1_rrname: daisy.ubuntu.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 400, dns_answers_1_rdata: 162.213.33.164, dns_grouped_A_0: 162.213.33.133, dns_grouped_A_1: 162.213.33.164 ; pcap_cnt: 2694064, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 54558, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: daisy.ubuntu.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: daisy.ubuntu.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 400, dns_answers_0_rdata: 162.213.33.133, dns_answers_1_rrname: daisy.ubuntu.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 400, dns_answers_1_rdata: 162.213.33.164, dns_grouped_A_0: 162.213.33.133, dns_grouped_A_1: 162.213.33.164
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 7, flow_pkts_toclient: 7, flow_bytes_toserver: 752, flow_bytes_toclient: 4178, flow_age: 1, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 2695438, event_type: tls, proto: TCP, tls_subject: C=US, ST=CA, L=Sunnyvale, O=Yahoo! Inc., CN=*.btrll.com, tls_issuerdn: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert SHA2 High Assurance Server CA, tls_serial: 0F:E9:A8:BE:6F:FE:7D:F2:EE:20:7C:13:F1:B1:D6:81, tls_fingerprint: 75:e8:09:d6:3e:e9:d9:21:81:32:5d:ca:ec:5d:0c:b1:ad:a9:70:ea, tls_sni: vast.bp3859005.btrll.com, tls_version: TLS 1.2, tls_notbefore: 2017-04-26T00:00:00, tls_notafter: 2017-10-26T12:00:00
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 7, flow_pkts_toclient: 7, flow_bytes_toserver: 748, flow_bytes_toclient: 4178, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 2695721, event_type: tls, proto: TCP, tls_subject: C=US, ST=CA, L=Sunnyvale, O=Yahoo! Inc., CN=*.btrll.com, tls_issuerdn: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert SHA2 High Assurance Server CA, tls_serial: 0F:E9:A8:BE:6F:FE:7D:F2:EE:20:7C:13:F1:B1:D6:81, tls_fingerprint: 75:e8:09:d6:3e:e9:d9:21:81:32:5d:ca:ec:5d:0c:b1:ad:a9:70:ea, tls_sni: vast.bp3868102.btrll.com, tls_version: TLS 1.2, tls_notbefore: 2017-04-26T00:00:00, tls_notafter: 2017-10-26T12:00:00
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 7, flow_pkts_toclient: 7, flow_bytes_toserver: 748, flow_bytes_toclient: 4178, flow_age: 1, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 2696006, event_type: tls, proto: TCP, tls_subject: C=US, ST=CA, L=Sunnyvale, O=Yahoo! Inc., CN=*.btrll.com, tls_issuerdn: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert SHA2 High Assurance Server CA, tls_serial: 0F:E9:A8:BE:6F:FE:7D:F2:EE:20:7C:13:F1:B1:D6:81, tls_fingerprint: 75:e8:09:d6:3e:e9:d9:21:81:32:5d:ca:ec:5d:0c:b1:ad:a9:70:ea, tls_sni: vast.bp3856327.btrll.com, tls_version: TLS 1.2, tls_notbefore: 2017-04-26T00:00:00, tls_notafter: 2017-10-26T12:00:00
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 7, flow_pkts_toclient: 7, flow_bytes_toserver: 752, flow_bytes_toclient: 4178, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 2697728, event_type: tls, proto: TCP, tls_subject: C=US, ST=CA, L=Sunnyvale, O=Yahoo! Inc., CN=*.btrll.com, tls_issuerdn: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert SHA2 High Assurance Server CA, tls_serial: 0F:E9:A8:BE:6F:FE:7D:F2:EE:20:7C:13:F1:B1:D6:81, tls_fingerprint: 75:e8:09:d6:3e:e9:d9:21:81:32:5d:ca:ec:5d:0c:b1:ad:a9:70:ea, tls_sni: vast.bp3868102.btrll.com, tls_version: TLS 1.2, tls_notbefore: 2017-04-26T00:00:00, tls_notafter: 2017-10-26T12:00:00
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 7, flow_pkts_toclient: 7, flow_bytes_toserver: 752, flow_bytes_toclient: 4178, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 2697925, event_type: tls, proto: TCP, tls_subject: C=US, ST=CA, L=Sunnyvale, O=Yahoo! Inc., CN=*.btrll.com, tls_issuerdn: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert SHA2 High Assurance Server CA, tls_serial: 0F:E9:A8:BE:6F:FE:7D:F2:EE:20:7C:13:F1:B1:D6:81, tls_fingerprint: 75:e8:09:d6:3e:e9:d9:21:81:32:5d:ca:ec:5d:0c:b1:ad:a9:70:ea, tls_sni: vast.bp3859005.btrll.com, tls_version: TLS 1.2, tls_notbefore: 2017-04-26T00:00:00, tls_notafter: 2017-10-26T12:00:00
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 7, flow_pkts_toclient: 6, flow_bytes_toserver: 748, flow_bytes_toclient: 4124, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 2698237, event_type: tls, proto: TCP, tls_sni: vast.bp3856327.btrll.com, tls_version: UNDETERMINED
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 172, flow_bytes_toclient: 272, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2699379, event_type: dns, proto: UDP, dns_type: query, dns_id: 25448, dns_rrname: _kerberos._tcp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 0 ; pcap_cnt: 2699380, event_type: dns, proto: UDP, dns_type: query, dns_id: 25448, dns_rrname: _kerberos._tcp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 1 ; pcap_cnt: 2699381, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 25448, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _kerberos._tcp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _kerberos._tcp.TESTBED1.CA, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600 ; pcap_cnt: 2699382, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 25448, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _kerberos._tcp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NOERROR, dns_answers_0_rrname: _kerberos._tcp.TESTBED1.CA, dns_answers_0_rrtype: SRV, dns_answers_0_ttl: 600
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 146, flow_bytes_toclient: 246, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2699792, event_type: dns, proto: UDP, dns_type: query, dns_id: 37027, dns_rrname: redir.adap.tv, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 2699793, event_type: dns, proto: UDP, dns_type: query, dns_id: 37027, dns_rrname: redir.adap.tv, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 2699794, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 37027, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: redir.adap.tv, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: redir.adap.tv, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 3014, dns_answers_0_rdata: cs631.wpc.taucdn.net, dns_answers_1_rrname: cs631.wpc.taucdn.net, dns_answers_1_rrtype: A, dns_answers_1_ttl: 3041, dns_answers_1_rdata: 192.229.211.40, dns_grouped_A_0: 192.229.211.40, dns_grouped_CNAME_0: cs631.wpc.taucdn.net ; pcap_cnt: 2699795, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 37027, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: redir.adap.tv, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: redir.adap.tv, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 3014, dns_answers_0_rdata: cs631.wpc.taucdn.net, dns_answers_1_rrname: cs631.wpc.taucdn.net, dns_answers_1_rrtype: A, dns_answers_1_ttl: 3041, dns_answers_1_rdata: 192.229.211.40, dns_grouped_A_0: 192.229.211.40, dns_grouped_CNAME_0: cs631.wpc.taucdn.net
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 130, flow_bytes_toclient: 130, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2700010, event_type: dns, proto: UDP, dns_type: query, dns_id: 15622, dns_rrname: macpc, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 2700011, event_type: dns, proto: UDP, dns_type: query, dns_id: 15622, dns_rrname: macpc, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 2700014, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 15622, dns_flags: 8182, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: macpc, dns_rrtype: AAAA, dns_rcode: SERVFAIL ; pcap_cnt: 2700015, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 15622, dns_flags: 8182, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: macpc, dns_rrtype: AAAA, dns_rcode: SERVFAIL
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 170, flow_bytes_toclient: 226, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2705108, event_type: dns, proto: UDP, dns_type: query, dns_id: 14163, dns_rrname: 3.10.168.192.in-addr.arpa, dns_rrtype: PTR, dns_tx_id: 0 ; pcap_cnt: 2705109, event_type: dns, proto: UDP, dns_type: query, dns_id: 14163, dns_rrname: 3.10.168.192.in-addr.arpa, dns_rrtype: PTR, dns_tx_id: 1 ; pcap_cnt: 2705110, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 14163, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: 3.10.168.192.in-addr.arpa, dns_rrtype: PTR, dns_rcode: NOERROR, dns_answers_0_rrname: 3.10.168.192.in-addr.arpa, dns_answers_0_rrtype: PTR, dns_answers_0_ttl: 1200, dns_answers_0_rdata: DC.Testbed1.ca, dns_grouped_PTR_0: DC.Testbed1.ca ; pcap_cnt: 2705111, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 14163, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: 3.10.168.192.in-addr.arpa, dns_rrtype: PTR, dns_rcode: NOERROR, dns_answers_0_rrname: 3.10.168.192.in-addr.arpa, dns_answers_0_rrtype: PTR, dns_answers_0_ttl: 1200, dns_answers_0_rdata: DC.Testbed1.ca, dns_grouped_PTR_0: DC.Testbed1.ca
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 23, flow_pkts_toclient: 19, flow_bytes_toserver: 2898, flow_bytes_toclient: 27625, flow_age: 51, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1f, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 7, flow_pkts_toclient: 5, flow_bytes_toserver: 757, flow_bytes_toclient: 982, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 2710395, event_type: http, proto: TCP, tx_id: 0, http_hostname: asset.pagefair.com, http_url: /adimages/textlink-ads.jpg, http_http_user_agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_5_8) AppleWebKit/534.50.2 (KHTML, like Gecko) Version/5.0.6 Safari/533.22.3, http_http_content_type: image/jpeg, http_http_refer: http://www.today.com/, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 229 ; pcap_cnt: 2710402, event_type: fileinfo, proto: TCP, http_hostname: asset.pagefair.com, http_url: /adimages/textlink-ads.jpg, http_http_user_agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_5_8) AppleWebKit/534.50.2 (KHTML, like Gecko) Version/5.0.6 Safari/533.22.3, http_http_content_type: image/jpeg, http_http_refer: http://www.today.com/, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 229, app_proto: http, fileinfo_filename: /adimages/textlink-ads.jpg, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 518, fileinfo_tx_id: 0
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 160, flow_bytes_toclient: 224, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2710329, event_type: dns, proto: UDP, dns_type: query, dns_id: 25324, dns_rrname: nbcume.sc.omtrdc.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 2710330, event_type: dns, proto: UDP, dns_type: query, dns_id: 25324, dns_rrname: nbcume.sc.omtrdc.net, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 2710381, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 25324, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: nbcume.sc.omtrdc.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: nbcume.sc.omtrdc.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 461, dns_answers_0_rdata: 192.243.250.84, dns_answers_1_rrname: nbcume.sc.omtrdc.net, dns_answers_1_rrtype: A, dns_answers_1_ttl: 461, dns_answers_1_rdata: 192.243.250.68, dns_grouped_A_0: 192.243.250.84, dns_grouped_A_1: 192.243.250.68 ; pcap_cnt: 2710382, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 25324, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: nbcume.sc.omtrdc.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: nbcume.sc.omtrdc.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 461, dns_answers_0_rdata: 192.243.250.84, dns_answers_1_rrname: nbcume.sc.omtrdc.net, dns_answers_1_rrtype: A, dns_answers_1_ttl: 461, dns_answers_1_rdata: 192.243.250.68, dns_grouped_A_0: 192.243.250.84, dns_grouped_A_1: 192.243.250.68
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 87, flow_bytes_toclient: 183, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2711104, event_type: dns, proto: UDP, dns_type: query, dns_id: 15923, dns_rrname: www.newsvine.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 2711397, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 15923, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.newsvine.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: www.newsvine.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 251, dns_answers_0_rdata: wildcard.newsvine.com.edgekey.net, dns_answers_1_rrname: wildcard.newsvine.com.edgekey.net, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 20825, dns_answers_1_rdata: e4218.b.akamaiedge.net, dns_answers_2_rrname: e4218.b.akamaiedge.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 17, dns_answers_2_rdata: 23.217.50.210, dns_grouped_CNAME_0: wildcard.newsvine.com.edgekey.net, dns_grouped_CNAME_1: e4218.b.akamaiedge.net, dns_grouped_A_0: 23.217.50.210
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 13, flow_pkts_toclient: 9, flow_bytes_toserver: 1424, flow_bytes_toclient: 4963, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1f, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 2713870, event_type: tls, proto: TCP, tls_session_resumed: True, tls_sni: ads.pubmatic.com, tls_version: TLSv1
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 21, flow_pkts_toclient: 18, flow_bytes_toserver: 1857, flow_bytes_toclient: 3700, flow_age: 116, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 2986365, event_type: http, proto: TCP, tx_id: 0, http_hostname: www.haberturk.com, http_url: /widgetjs/PopupAnketData.js, http_http_user_agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:54.0) Gecko/20100101 Firefox/54.0, http_http_content_type: application/x-javascript, http_http_refer: http://www.haberturk.com/, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 2053 ; pcap_cnt: 2986928, event_type: fileinfo, proto: TCP, http_hostname: www.haberturk.com, http_url: /widgetjs/PopupAnketData.js, http_http_user_agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:54.0) Gecko/20100101 Firefox/54.0, http_http_content_type: application/x-javascript, http_http_refer: http://www.haberturk.com/, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 2053, app_proto: http, fileinfo_filename: /widgetjs/PopupAnketData.js, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 7147, fileinfo_tx_id: 0 ; pcap_cnt: 2986930, event_type: http, proto: TCP, tx_id: 1, http_hostname: www.haberturk.com, http_url: /widgetjs/sondakikaTicker.js, http_http_user_agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:54.0) Gecko/20100101 Firefox/54.0, http_http_content_type: application/x-javascript, http_http_refer: http://www.haberturk.com/, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 45 ; pcap_cnt: 3041001, event_type: fileinfo, proto: TCP, http_hostname: www.haberturk.com, http_url: /widgetjs/sondakikaTicker.js, http_http_user_agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:54.0) Gecko/20100101 Firefox/54.0, http_http_content_type: application/x-javascript, http_http_refer: http://www.haberturk.com/, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 45, app_proto: http, fileinfo_filename: /widgetjs/sondakikaTicker.js, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 25, fileinfo_tx_id: 1
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 32, flow_pkts_toclient: 28, flow_bytes_toserver: 2916, flow_bytes_toclient: 27660, flow_age: 2, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 2992967, event_type: tls, proto: TCP, tls_sni: www.googletagmanager.com, tls_version: UNDETERMINED
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 148, flow_bytes_toclient: 180, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 2997013, event_type: dns, proto: UDP, dns_type: query, dns_id: 45280, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 2997014, event_type: dns, proto: UDP, dns_type: query, dns_id: 45280, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 2997017, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 45280, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: DC.Testbed1.ca, dns_answers_0_rrtype: A, dns_answers_0_ttl: 3600, dns_answers_0_rdata: 192.168.10.3, dns_grouped_A_0: 192.168.10.3 ; pcap_cnt: 2997018, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 45280, dns_flags: 8580, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: DC.Testbed1.ca, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: DC.Testbed1.ca, dns_answers_0_rrtype: A, dns_answers_0_ttl: 3600, dns_answers_0_rdata: 192.168.10.3, dns_grouped_A_0: 192.168.10.3
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 97, flow_bytes_toclient: 160, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 3394843, event_type: dns, proto: UDP, dns_type: query, dns_id: 53936, dns_rrname: 217.52.183.54.in-addr.arpa, dns_rrtype: PTR, dns_tx_id: 0 ; pcap_cnt: 3395128, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 53936, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: 217.52.183.54.in-addr.arpa, dns_rrtype: PTR, dns_rcode: NOERROR, dns_answers_0_rrname: 217.52.183.54.in-addr.arpa, dns_answers_0_rrtype: PTR, dns_answers_0_ttl: 102, dns_answers_0_rdata: ec2-54-183-52-217.us-west-1.compute.amazonaws.com, dns_grouped_PTR_0: ec2-54-183-52-217.us-west-1.compute.amazonaws.com
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 93, flow_bytes_toclient: 109, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 3521131, event_type: dns, proto: UDP, dns_type: query, dns_id: 51154, dns_rrname: e7070.g.akamaiedge.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 3521280, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 51154, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: e7070.g.akamaiedge.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: e7070.g.akamaiedge.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 5, dns_answers_0_rdata: 104.92.129.30, dns_grouped_A_0: 104.92.129.30
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 26, flow_pkts_toclient: 23, flow_bytes_toserver: 16526, flow_bytes_toclient: 7170, flow_age: 116, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 3656067, event_type: tls, proto: TCP, tls_sni: safebrowsing.google.com, tls_version: UNDETERMINED
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 12, flow_pkts_toclient: 11, flow_bytes_toserver: 2203, flow_bytes_toclient: 6068, flow_age: 65, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 3750076, event_type: tls, proto: TCP, tls_subject: CN=*.eu.angsrvr.com, tls_issuerdn: C=US, O=Amazon, OU=Server CA 1B, CN=Amazon, tls_serial: 05:3C:40:3E:17:0D:47:23:B6:D8:30:30:16:EF:F7:98, tls_fingerprint: 7e:54:69:bd:b8:fd:4c:9b:0f:0e:5a:9f:56:61:89:6f:24:0f:8c:86, tls_sni: ac.eu.angsrvr.com, tls_version: TLS 1.2, tls_notbefore: 2017-02-20T00:00:00, tls_notafter: 2018-03-20T12:00:00
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 150, flow_bytes_toclient: 362, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 3780791, event_type: dns, proto: UDP, dns_type: query, dns_id: 22790, dns_rrname: mo.ciner.com.tr, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 3780792, event_type: dns, proto: UDP, dns_type: query, dns_id: 22790, dns_rrname: mo.ciner.com.tr, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 3780798, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 22790, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: mo.ciner.com.tr, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: mo.ciner.com.tr, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 3373, dns_answers_0_rdata: images.cbgmedia.akadns.net, dns_grouped_CNAME_0: images.cbgmedia.akadns.net, dns_authorities_0_rrname: akadns.net, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 178, dns_authorities_0_soa_mname: internal.akadns.net, dns_authorities_0_soa_rname: hostmaster.akamai.com, dns_authorities_0_soa_serial: 1499085426, dns_authorities_0_soa_refresh: 90000, dns_authorities_0_soa_retry: 90000, dns_authorities_0_soa_expire: 90000, dns_authorities_0_soa_minimum: 180 ; pcap_cnt: 3780799, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 22790, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: mo.ciner.com.tr, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: mo.ciner.com.tr, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 3373, dns_answers_0_rdata: images.cbgmedia.akadns.net, dns_grouped_CNAME_0: images.cbgmedia.akadns.net, dns_authorities_0_rrname: akadns.net, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 178, dns_authorities_0_soa_mname: internal.akadns.net, dns_authorities_0_soa_rname: hostmaster.akamai.com, dns_authorities_0_soa_serial: 1499085426, dns_authorities_0_soa_refresh: 90000, dns_authorities_0_soa_retry: 90000, dns_authorities_0_soa_expire: 90000, dns_authorities_0_soa_minimum: 180
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 150, flow_bytes_toclient: 362, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 3779072, event_type: dns, proto: UDP, dns_type: query, dns_id: 47814, dns_rrname: mo.ciner.com.tr, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 3779073, event_type: dns, proto: UDP, dns_type: query, dns_id: 47814, dns_rrname: mo.ciner.com.tr, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 3779076, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 47814, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: mo.ciner.com.tr, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: mo.ciner.com.tr, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 3373, dns_answers_0_rdata: images.cbgmedia.akadns.net, dns_grouped_CNAME_0: images.cbgmedia.akadns.net, dns_authorities_0_rrname: akadns.net, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 178, dns_authorities_0_soa_mname: internal.akadns.net, dns_authorities_0_soa_rname: hostmaster.akamai.com, dns_authorities_0_soa_serial: 1499085426, dns_authorities_0_soa_refresh: 90000, dns_authorities_0_soa_retry: 90000, dns_authorities_0_soa_expire: 90000, dns_authorities_0_soa_minimum: 180 ; pcap_cnt: 3779077, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 47814, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: mo.ciner.com.tr, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: mo.ciner.com.tr, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 3373, dns_answers_0_rdata: images.cbgmedia.akadns.net, dns_grouped_CNAME_0: images.cbgmedia.akadns.net, dns_authorities_0_rrname: akadns.net, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 178, dns_authorities_0_soa_mname: internal.akadns.net, dns_authorities_0_soa_rname: hostmaster.akamai.com, dns_authorities_0_soa_serial: 1499085426, dns_authorities_0_soa_refresh: 90000, dns_authorities_0_soa_retry: 90000, dns_authorities_0_soa_expire: 90000, dns_authorities_0_soa_minimum: 180
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 4, flow_pkts_toclient: 2, flow_bytes_toserver: 296, flow_bytes_toclient: 268, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 3785566, event_type: dns, proto: UDP, dns_type: query, dns_id: 8095, dns_rrname: www.ddanzi.com, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 3785567, event_type: dns, proto: UDP, dns_type: query, dns_id: 8095, dns_rrname: www.ddanzi.com, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 3785635, event_type: dns, proto: UDP, dns_type: query, dns_id: 8095, dns_rrname: www.ddanzi.com, dns_rrtype: AAAA, dns_tx_id: 2 ; pcap_cnt: 3785636, event_type: dns, proto: UDP, dns_type: query, dns_id: 8095, dns_rrname: www.ddanzi.com, dns_rrtype: AAAA, dns_tx_id: 3 ; pcap_cnt: 3785749, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 8095, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.ddanzi.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: ddanzi.com, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 900, dns_authorities_0_soa_mname: lloyd.ns.cloudflare.com, dns_authorities_0_soa_rname: dns.cloudflare.com, dns_authorities_0_soa_serial: 2024788883, dns_authorities_0_soa_refresh: 10000, dns_authorities_0_soa_retry: 2400, dns_authorities_0_soa_expire: 604800, dns_authorities_0_soa_minimum: 3600 ; pcap_cnt: 3785750, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 8095, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.ddanzi.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: ddanzi.com, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 900, dns_authorities_0_soa_mname: lloyd.ns.cloudflare.com, dns_authorities_0_soa_rname: dns.cloudflare.com, dns_authorities_0_soa_serial: 2024788883, dns_authorities_0_soa_refresh: 10000, dns_authorities_0_soa_retry: 2400, dns_authorities_0_soa_expire: 604800, dns_authorities_0_soa_minimum: 3600
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 150, flow_bytes_toclient: 262, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 3783788, event_type: dns, proto: UDP, dns_type: query, dns_id: 39907, dns_rrname: mo.ciner.com.tr, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 3783789, event_type: dns, proto: UDP, dns_type: query, dns_id: 39907, dns_rrname: mo.ciner.com.tr, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 3783790, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 39907, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: mo.ciner.com.tr, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: mo.ciner.com.tr, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 3373, dns_answers_0_rdata: images.cbgmedia.akadns.net, dns_answers_1_rrname: images.cbgmedia.akadns.net, dns_answers_1_rrtype: A, dns_answers_1_ttl: 117, dns_answers_1_rdata: 92.45.106.114, dns_grouped_CNAME_0: images.cbgmedia.akadns.net, dns_grouped_A_0: 92.45.106.114 ; pcap_cnt: 3783791, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 39907, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: mo.ciner.com.tr, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: mo.ciner.com.tr, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 3373, dns_answers_0_rdata: images.cbgmedia.akadns.net, dns_answers_1_rrname: images.cbgmedia.akadns.net, dns_answers_1_rrtype: A, dns_answers_1_ttl: 117, dns_answers_1_rdata: 92.45.106.114, dns_grouped_A_0: 92.45.106.114, dns_grouped_CNAME_0: images.cbgmedia.akadns.net
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 178, flow_bytes_toclient: 280, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 3787592, event_type: dns, proto: UDP, dns_type: query, dns_id: 5604, dns_rrname: safebrowsing-cache.google.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 3787593, event_type: dns, proto: UDP, dns_type: query, dns_id: 5604, dns_rrname: safebrowsing-cache.google.com, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 3787596, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 5604, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: safebrowsing-cache.google.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: safebrowsing-cache.google.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 24670, dns_answers_0_rdata: safebrowsing.cache.l.google.com, dns_answers_1_rrname: safebrowsing.cache.l.google.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 269, dns_answers_1_rdata: 172.217.10.238, dns_grouped_CNAME_0: safebrowsing.cache.l.google.com, dns_grouped_A_0: 172.217.10.238 ; pcap_cnt: 3787597, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 5604, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: safebrowsing-cache.google.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: safebrowsing-cache.google.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 24670, dns_answers_0_rdata: safebrowsing.cache.l.google.com, dns_answers_1_rrname: safebrowsing.cache.l.google.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 269, dns_answers_1_rdata: 172.217.10.238, dns_grouped_A_0: 172.217.10.238, dns_grouped_CNAME_0: safebrowsing.cache.l.google.com
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 178, flow_bytes_toclient: 304, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 3786672, event_type: dns, proto: UDP, dns_type: query, dns_id: 4954, dns_rrname: safebrowsing-cache.google.com, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 3786673, event_type: dns, proto: UDP, dns_type: query, dns_id: 4954, dns_rrname: safebrowsing-cache.google.com, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 3786676, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 4954, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: safebrowsing-cache.google.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: safebrowsing-cache.google.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 24670, dns_answers_0_rdata: safebrowsing.cache.l.google.com, dns_answers_1_rrname: safebrowsing.cache.l.google.com, dns_answers_1_rrtype: AAAA, dns_answers_1_ttl: 54, dns_answers_1_rdata: 2607:f8b0:4006:0801:0000:0000:0000:200e, dns_grouped_AAAA_0: 2607:f8b0:4006:0801:0000:0000:0000:200e, dns_grouped_CNAME_0: safebrowsing.cache.l.google.com ; pcap_cnt: 3786677, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 4954, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: safebrowsing-cache.google.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: safebrowsing-cache.google.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 24670, dns_answers_0_rdata: safebrowsing.cache.l.google.com, dns_answers_1_rrname: safebrowsing.cache.l.google.com, dns_answers_1_rrtype: AAAA, dns_answers_1_ttl: 54, dns_answers_1_rdata: 2607:f8b0:4006:0801:0000:0000:0000:200e, dns_grouped_AAAA_0: 2607:f8b0:4006:0801:0000:0000:0000:200e, dns_grouped_CNAME_0: safebrowsing.cache.l.google.com
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 148, flow_bytes_toclient: 180, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 3832018, event_type: dns, proto: UDP, dns_type: query, dns_id: 47639, dns_rrname: dis.criteo.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 3832019, event_type: dns, proto: UDP, dns_type: query, dns_id: 47639, dns_rrname: dis.criteo.com, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 3832022, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 47639, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: dis.criteo.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: dis.criteo.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 142, dns_answers_0_rdata: 74.119.118.94, dns_grouped_A_0: 74.119.118.94 ; pcap_cnt: 3832023, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 47639, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: dis.criteo.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: dis.criteo.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 142, dns_answers_0_rdata: 74.119.118.94, dns_grouped_A_0: 74.119.118.94
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 170, flow_bytes_toclient: 202, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 3840389, event_type: dns, proto: UDP, dns_type: query, dns_id: 40697, dns_rrname: gstaticadssl.l.google.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 3840390, event_type: dns, proto: UDP, dns_type: query, dns_id: 40697, dns_rrname: gstaticadssl.l.google.com, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 3840391, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 40697, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: gstaticadssl.l.google.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: gstaticadssl.l.google.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 156, dns_answers_0_rdata: 172.217.12.195, dns_grouped_A_0: 172.217.12.195 ; pcap_cnt: 3840392, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 40697, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: gstaticadssl.l.google.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: gstaticadssl.l.google.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 156, dns_answers_0_rdata: 172.217.12.195, dns_grouped_A_0: 172.217.12.195
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 86, flow_bytes_toclient: 116, flow_age: 1, flow_state: established, flow_reason: timeout ; pcap_cnt: 4005532, event_type: dns, proto: UDP, dns_type: query, dns_id: 59843, dns_rrname: www.otoraba.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 4006634, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 59843, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.otoraba.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: www.otoraba.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 85515, dns_answers_0_rdata: otoraba.com, dns_answers_1_rrname: otoraba.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 86399, dns_answers_1_rdata: 195.142.107.75, dns_grouped_CNAME_0: otoraba.com, dns_grouped_A_0: 195.142.107.75
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 156, flow_bytes_toclient: 212, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 4021904, event_type: dns, proto: UDP, dns_type: query, dns_id: 61884, dns_rrname: ocsp.usertrust.com, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 4021905, event_type: dns, proto: UDP, dns_type: query, dns_id: 61884, dns_rrname: ocsp.usertrust.com, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 4022132, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 61884, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: ocsp.usertrust.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: ocsp.usertrust.com, dns_answers_0_rrtype: AAAA, dns_answers_0_ttl: 108, dns_answers_0_rdata: 2a02:1788:02fd:0000:0000:0000:b2ff:5301, dns_grouped_AAAA_0: 2a02:1788:02fd:0000:0000:0000:b2ff:5301 ; pcap_cnt: 4022133, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 61884, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: ocsp.usertrust.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: ocsp.usertrust.com, dns_answers_0_rrtype: AAAA, dns_answers_0_ttl: 108, dns_answers_0_rdata: 2a02:1788:02fd:0000:0000:0000:b2ff:5301, dns_grouped_AAAA_0: 2a02:1788:02fd:0000:0000:0000:b2ff:5301
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 148, flow_bytes_toclient: 180, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 4030193, event_type: dns, proto: UDP, dns_type: query, dns_id: 37956, dns_rrname: www.google.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 4030195, event_type: dns, proto: UDP, dns_type: query, dns_id: 37956, dns_rrname: www.google.com, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 4030198, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 37956, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.google.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: www.google.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 243, dns_answers_0_rdata: 172.217.6.196, dns_grouped_A_0: 172.217.6.196 ; pcap_cnt: 4030199, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 37956, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.google.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: www.google.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 243, dns_answers_0_rdata: 172.217.6.196, dns_grouped_A_0: 172.217.6.196
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 166, flow_bytes_toclient: 198, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 4031513, event_type: dns, proto: UDP, dns_type: query, dns_id: 1344, dns_rrname: e1879.e7.akamaiedge.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 4031514, event_type: dns, proto: UDP, dns_type: query, dns_id: 1344, dns_rrname: e1879.e7.akamaiedge.net, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 4031515, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 1344, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: e1879.e7.akamaiedge.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: e1879.e7.akamaiedge.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 19, dns_answers_0_rdata: 104.88.89.135, dns_grouped_A_0: 104.88.89.135 ; pcap_cnt: 4031516, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 1344, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: e1879.e7.akamaiedge.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: e1879.e7.akamaiedge.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 19, dns_answers_0_rdata: 104.88.89.135, dns_grouped_A_0: 104.88.89.135
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 88, flow_bytes_toclient: 216, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 4036796, event_type: dns, proto: UDP, dns_type: query, dns_id: 24125, dns_rrname: a248.e.akamai.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 4037299, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 24125, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: a248.e.akamai.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: a248.e.akamai.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 19, dns_answers_0_rdata: 72.249.192.49, dns_answers_1_rrname: a248.e.akamai.net, dns_answers_1_rrtype: A, dns_answers_1_ttl: 19, dns_answers_1_rdata: 72.249.192.56, dns_answers_2_rrname: a248.e.akamai.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 19, dns_answers_2_rdata: 72.249.192.66, dns_answers_3_rrname: a248.e.akamai.net, dns_answers_3_rrtype: A, dns_answers_3_ttl: 19, dns_answers_3_rdata: 72.249.192.48, dns_answers_4_rrname: a248.e.akamai.net, dns_answers_4_rrtype: A, dns_answers_4_ttl: 19, dns_answers_4_rdata: 72.249.192.64, dns_answers_5_rrname: a248.e.akamai.net, dns_answers_5_rrtype: A, dns_answers_5_ttl: 19, dns_answers_5_rdata: 72.249.192.65, dns_answers_6_rrname: a248.e.akamai.net, dns_answers_6_rrtype: A, dns_answers_6_ttl: 19, dns_answers_6_rdata: 72.249.192.50, dns_answers_7_rrname: a248.e.akamai.net, dns_answers_7_rrtype: A, dns_answers_7_ttl: 19, dns_answers_7_rdata: 72.249.192.72, dns_grouped_A_0: 72.249.192.49, dns_grouped_A_1: 72.249.192.56, dns_grouped_A_2: 72.249.192.66, dns_grouped_A_3: 72.249.192.48, dns_grouped_A_4: 72.249.192.64, dns_grouped_A_5: 72.249.192.65, dns_grouped_A_6: 72.249.192.50, dns_grouped_A_7: 72.249.192.72
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 146, flow_bytes_toclient: 266, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 4082987, event_type: dns, proto: UDP, dns_type: query, dns_id: 9148, dns_rrname: s.twitter.com, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 4082988, event_type: dns, proto: UDP, dns_type: query, dns_id: 9148, dns_rrname: s.twitter.com, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 4083123, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 9148, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: s.twitter.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: twitter.com, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 60, dns_authorities_0_soa_mname: ns-881.awsdns-46.net, dns_authorities_0_soa_rname: ops.twitter.com, dns_authorities_0_soa_serial: 2007131073, dns_authorities_0_soa_refresh: 3600, dns_authorities_0_soa_retry: 600, dns_authorities_0_soa_expire: 604800, dns_authorities_0_soa_minimum: 60 ; pcap_cnt: 4083124, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 9148, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: s.twitter.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: twitter.com, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 60, dns_authorities_0_soa_mname: ns-881.awsdns-46.net, dns_authorities_0_soa_rname: ops.twitter.com, dns_authorities_0_soa_serial: 2007131073, dns_authorities_0_soa_refresh: 3600, dns_authorities_0_soa_retry: 600, dns_authorities_0_soa_expire: 604800, dns_authorities_0_soa_minimum: 60
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 174, flow_bytes_toclient: 256, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 4170053, event_type: dns, proto: UDP, dns_type: query, dns_id: 55054, dns_rrname: googleads.g.doubleclick.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 4170055, event_type: dns, proto: UDP, dns_type: query, dns_id: 55054, dns_rrname: googleads.g.doubleclick.net, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 4170058, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 55054, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: googleads.g.doubleclick.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: googleads.g.doubleclick.net, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 34, dns_answers_0_rdata: pagead46.l.doubleclick.net, dns_answers_1_rrname: pagead46.l.doubleclick.net, dns_answers_1_rrtype: A, dns_answers_1_ttl: 210, dns_answers_1_rdata: 172.217.10.226, dns_grouped_CNAME_0: pagead46.l.doubleclick.net, dns_grouped_A_0: 172.217.10.226 ; pcap_cnt: 4170059, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 55054, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: googleads.g.doubleclick.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: googleads.g.doubleclick.net, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 34, dns_answers_0_rdata: pagead46.l.doubleclick.net, dns_answers_1_rrname: pagead46.l.doubleclick.net, dns_answers_1_rrtype: A, dns_answers_1_ttl: 210, dns_answers_1_rdata: 172.217.10.226, dns_grouped_CNAME_0: pagead46.l.doubleclick.net, dns_grouped_A_0: 172.217.10.226
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 170, flow_bytes_toclient: 246, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 4225776, event_type: dns, proto: UDP, dns_type: query, dns_id: 17338, dns_rrname: 6.11.217.172.in-addr.arpa, dns_rrtype: PTR, dns_tx_id: 0 ; pcap_cnt: 4225777, event_type: dns, proto: UDP, dns_type: query, dns_id: 17338, dns_rrname: 6.11.217.172.in-addr.arpa, dns_rrtype: PTR, dns_tx_id: 1 ; pcap_cnt: 4225778, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 17338, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: 6.11.217.172.in-addr.arpa, dns_rrtype: PTR, dns_rcode: NOERROR, dns_answers_0_rrname: 6.11.217.172.in-addr.arpa, dns_answers_0_rrtype: PTR, dns_answers_0_ttl: 86359, dns_answers_0_rdata: lga25s60-in-f6.1e100.net, dns_grouped_PTR_0: lga25s60-in-f6.1e100.net ; pcap_cnt: 4225779, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 17338, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: 6.11.217.172.in-addr.arpa, dns_rrtype: PTR, dns_rcode: NOERROR, dns_answers_0_rrname: 6.11.217.172.in-addr.arpa, dns_answers_0_rrtype: PTR, dns_answers_0_ttl: 86359, dns_answers_0_rdata: lga25s60-in-f6.1e100.net, dns_grouped_PTR_0: lga25s60-in-f6.1e100.net
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 10, flow_pkts_toclient: 12, flow_bytes_toserver: 1890, flow_bytes_toclient: 8468, flow_age: 10, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4265362, event_type: tls, proto: TCP, tls_subject: C=US, ST=New York, L=New York, O=AppNexus, Inc., CN=*.adnxs.com, tls_issuerdn: C=US, O=GeoTrust Inc., CN=GeoTrust SSL CA - G3, tls_serial: 48:40:40:FB:7A:DD:CB:9D:E4:20:94:4D:C1:AF:F6:58, tls_fingerprint: ea:cb:61:b5:70:6d:a0:a2:a5:3a:4c:a4:e9:8a:e7:92:f5:1b:96:14, tls_sni: secure.adnxs.com, tls_version: TLS 1.2, tls_notbefore: 2016-02-25T00:00:00, tls_notafter: 2018-05-26T23:59:59
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 170, flow_bytes_toclient: 304, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 4279446, event_type: dns, proto: UDP, dns_type: query, dns_id: 60115, dns_rrname: 38.86.169.69.in-addr.arpa, dns_rrtype: PTR, dns_tx_id: 0 ; pcap_cnt: 4279447, event_type: dns, proto: UDP, dns_type: query, dns_id: 60115, dns_rrname: 38.86.169.69.in-addr.arpa, dns_rrtype: PTR, dns_tx_id: 1 ; pcap_cnt: 4279459, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 60115, dns_flags: 8183, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: 38.86.169.69.in-addr.arpa, dns_rrtype: PTR, dns_rcode: NXDOMAIN, dns_authorities_0_rrname: 86.169.69.in-addr.arpa, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 1, dns_authorities_0_soa_mname: ns1.sitelutions.com, dns_authorities_0_soa_rname: reverse-dns.sitelutions.com, dns_authorities_0_soa_serial: 3, dns_authorities_0_soa_refresh: 28000, dns_authorities_0_soa_retry: 7200, dns_authorities_0_soa_expire: 604800, dns_authorities_0_soa_minimum: 1 ; pcap_cnt: 4279460, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 60115, dns_flags: 8183, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: 38.86.169.69.in-addr.arpa, dns_rrtype: PTR, dns_rcode: NXDOMAIN, dns_authorities_0_rrname: 86.169.69.in-addr.arpa, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 1, dns_authorities_0_soa_mname: ns1.sitelutions.com, dns_authorities_0_soa_rname: reverse-dns.sitelutions.com, dns_authorities_0_soa_serial: 3, dns_authorities_0_soa_refresh: 28000, dns_authorities_0_soa_retry: 7200, dns_authorities_0_soa_expire: 604800, dns_authorities_0_soa_minimum: 1
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 196, flow_bytes_toclient: 314, flow_age: 44, flow_state: established, flow_reason: timeout ; pcap_cnt: 4357214, event_type: dns, proto: UDP, dns_type: query, dns_id: 21817, dns_rrname: 59.45.21.23.in-addr.arpa, dns_rrtype: PTR, dns_tx_id: 0 ; pcap_cnt: 4357279, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 21817, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: 59.45.21.23.in-addr.arpa, dns_rrtype: PTR, dns_rcode: NOERROR, dns_answers_0_rrname: 59.45.21.23.in-addr.arpa, dns_answers_0_rrtype: PTR, dns_answers_0_ttl: 18, dns_answers_0_rdata: ec2-23-21-45-59.compute-1.amazonaws.com, dns_grouped_PTR_0: ec2-23-21-45-59.compute-1.amazonaws.com ; pcap_cnt: 4549283, event_type: dns, proto: UDP, dns_type: query, dns_id: 9731, dns_rrname: anycast.fw.adsafeprotected.com, dns_rrtype: AAAA, dns_tx_id: 2 ; pcap_cnt: 4549476, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 9731, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: anycast.fw.adsafeprotected.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: adsafeprotected.com, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 55, dns_authorities_0_soa_mname: dns1.p05.nsone.net, dns_authorities_0_soa_rname: hostmaster.nsone.net, dns_authorities_0_soa_serial: 1497564449, dns_authorities_0_soa_refresh: 180, dns_authorities_0_soa_retry: 180, dns_authorities_0_soa_expire: 1209600, dns_authorities_0_soa_minimum: 7200
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 10, flow_pkts_toclient: 10, flow_bytes_toserver: 2089, flow_bytes_toclient: 6832, flow_age: 2, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 4361285, event_type: tls, proto: TCP, tls_session_resumed: True, tls_sni: loadus.exelator.com, tls_version: TLS 1.2
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 192, flow_bytes_toclient: 286, flow_age: 167, flow_state: established, flow_reason: timeout ; pcap_cnt: 4383061, event_type: dns, proto: UDP, dns_type: query, dns_id: 58716, dns_rrname: 194.216.19.50.in-addr.arpa, dns_rrtype: PTR, dns_tx_id: 0 ; pcap_cnt: 4383062, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 58716, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: 194.216.19.50.in-addr.arpa, dns_rrtype: PTR, dns_rcode: NOERROR, dns_answers_0_rrname: 194.216.19.50.in-addr.arpa, dns_answers_0_rrtype: PTR, dns_answers_0_ttl: 141, dns_answers_0_rdata: ec2-50-19-216-194.compute-1.amazonaws.com, dns_grouped_PTR_0: ec2-50-19-216-194.compute-1.amazonaws.com ; pcap_cnt: 5091567, event_type: dns, proto: UDP, dns_type: query, dns_id: 53407, dns_rrname: vast.bp3871768.btrll.com, dns_rrtype: A, dns_tx_id: 2 ; pcap_cnt: 5091732, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 53407, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: vast.bp3871768.btrll.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: vast.bp3871768.btrll.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 723, dns_answers_0_rdata: geo-rtas.btrll.com, dns_answers_1_rrname: geo-rtas.btrll.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 11, dns_answers_1_rdata: 162.208.20.178, dns_grouped_CNAME_0: geo-rtas.btrll.com, dns_grouped_A_0: 162.208.20.178
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 186, flow_bytes_toclient: 311, flow_age: 105, flow_state: established, flow_reason: timeout ; pcap_cnt: 4449023, event_type: dns, proto: UDP, dns_type: query, dns_id: 11857, dns_rrname: support.mozilla.org, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 4449599, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 11857, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: support.mozilla.org, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: support.mozilla.org, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 33, dns_answers_0_rdata: sumo.external.zlb.scl3.mozilla.com, dns_grouped_CNAME_0: sumo.external.zlb.scl3.mozilla.com, dns_authorities_0_rrname: mozilla.com, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 36, dns_authorities_0_soa_mname: ns.mozilla.org, dns_authorities_0_soa_rname: sysadmins.mozilla.org, dns_authorities_0_soa_serial: 2017062700, dns_authorities_0_soa_refresh: 180, dns_authorities_0_soa_retry: 180, dns_authorities_0_soa_expire: 1209600, dns_authorities_0_soa_minimum: 60 ; pcap_cnt: 4899414, event_type: dns, proto: UDP, dns_type: query, dns_id: 7497, dns_rrname: gstaticadssl.l.google.com, dns_rrtype: AAAA, dns_tx_id: 2 ; pcap_cnt: 4899669, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 7497, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: gstaticadssl.l.google.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: gstaticadssl.l.google.com, dns_answers_0_rrtype: AAAA, dns_answers_0_ttl: 299, dns_answers_0_rdata: 2607:f8b0:4006:0805:0000:0000:0000:2003, dns_grouped_AAAA_0: 2607:f8b0:4006:0805:0000:0000:0000:2003
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 180, flow_bytes_toclient: 264, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 4585882, event_type: dns, proto: UDP, dns_type: query, dns_id: 46732, dns_rrname: securepubads.g.doubleclick.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 4585883, event_type: dns, proto: UDP, dns_type: query, dns_id: 46732, dns_rrname: securepubads.g.doubleclick.net, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 4585886, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 46732, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: securepubads.g.doubleclick.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: securepubads.g.doubleclick.net, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 85698, dns_answers_0_rdata: partnerad.l.doubleclick.net, dns_answers_1_rrname: partnerad.l.doubleclick.net, dns_answers_1_rrtype: A, dns_answers_1_ttl: 228, dns_answers_1_rdata: 172.217.10.66, dns_grouped_A_0: 172.217.10.66, dns_grouped_CNAME_0: partnerad.l.doubleclick.net ; pcap_cnt: 4585887, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 46732, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: securepubads.g.doubleclick.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: securepubads.g.doubleclick.net, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 85698, dns_answers_0_rdata: partnerad.l.doubleclick.net, dns_answers_1_rrname: partnerad.l.doubleclick.net, dns_answers_1_rrtype: A, dns_answers_1_ttl: 228, dns_answers_1_rdata: 172.217.10.66, dns_grouped_A_0: 172.217.10.66, dns_grouped_CNAME_0: partnerad.l.doubleclick.net
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 168, flow_bytes_toclient: 288, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 4586939, event_type: dns, proto: UDP, dns_type: query, dns_id: 31816, dns_rrname: www.google-analytics.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 4586940, event_type: dns, proto: UDP, dns_type: query, dns_id: 31816, dns_rrname: www.google-analytics.com, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 4586943, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 31816, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.google-analytics.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: www.google-analytics.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 10445, dns_answers_0_rdata: www-google-analytics.l.google.com, dns_answers_1_rrname: www-google-analytics.l.google.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 175, dns_answers_1_rdata: 172.217.12.174, dns_grouped_CNAME_0: www-google-analytics.l.google.com, dns_grouped_A_0: 172.217.12.174 ; pcap_cnt: 4586944, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 31816, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.google-analytics.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: www.google-analytics.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 10445, dns_answers_0_rdata: www-google-analytics.l.google.com, dns_answers_1_rrname: www-google-analytics.l.google.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 175, dns_answers_1_rdata: 172.217.12.174, dns_grouped_CNAME_0: www-google-analytics.l.google.com, dns_grouped_A_0: 172.217.12.174
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 170, flow_bytes_toclient: 288, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 4587043, event_type: dns, proto: UDP, dns_type: query, dns_id: 63464, dns_rrname: tpc.googlesyndication.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 4587044, event_type: dns, proto: UDP, dns_type: query, dns_id: 63464, dns_rrname: tpc.googlesyndication.com, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 4587049, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 63464, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: tpc.googlesyndication.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: tpc.googlesyndication.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 39349, dns_answers_0_rdata: pagead-googlehosted.l.google.com, dns_answers_1_rrname: pagead-googlehosted.l.google.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 175, dns_answers_1_rdata: 172.217.10.33, dns_grouped_CNAME_0: pagead-googlehosted.l.google.com, dns_grouped_A_0: 172.217.10.33 ; pcap_cnt: 4587050, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 63464, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: tpc.googlesyndication.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: tpc.googlesyndication.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 39349, dns_answers_0_rdata: pagead-googlehosted.l.google.com, dns_answers_1_rrname: pagead-googlehosted.l.google.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 175, dns_answers_1_rdata: 172.217.10.33, dns_grouped_A_0: 172.217.10.33, dns_grouped_CNAME_0: pagead-googlehosted.l.google.com
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 150, flow_bytes_toclient: 362, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 4589152, event_type: dns, proto: UDP, dns_type: query, dns_id: 59531, dns_rrname: mo.ciner.com.tr, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 4589153, event_type: dns, proto: UDP, dns_type: query, dns_id: 59531, dns_rrname: mo.ciner.com.tr, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 4589156, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 59531, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: mo.ciner.com.tr, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: mo.ciner.com.tr, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 3191, dns_answers_0_rdata: images.cbgmedia.akadns.net, dns_grouped_CNAME_0: images.cbgmedia.akadns.net, dns_authorities_0_rrname: akadns.net, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 177, dns_authorities_0_soa_mname: internal.akadns.net, dns_authorities_0_soa_rname: hostmaster.akamai.com, dns_authorities_0_soa_serial: 1499085607, dns_authorities_0_soa_refresh: 90000, dns_authorities_0_soa_retry: 90000, dns_authorities_0_soa_expire: 90000, dns_authorities_0_soa_minimum: 180 ; pcap_cnt: 4589157, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 59531, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: mo.ciner.com.tr, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: mo.ciner.com.tr, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 3191, dns_answers_0_rdata: images.cbgmedia.akadns.net, dns_grouped_CNAME_0: images.cbgmedia.akadns.net, dns_authorities_0_rrname: akadns.net, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 177, dns_authorities_0_soa_mname: internal.akadns.net, dns_authorities_0_soa_rname: hostmaster.akamai.com, dns_authorities_0_soa_serial: 1499085607, dns_authorities_0_soa_refresh: 90000, dns_authorities_0_soa_retry: 90000, dns_authorities_0_soa_expire: 90000, dns_authorities_0_soa_minimum: 180
0
BENIGN
Classification: Normal The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations.