log
stringlengths 195
2.49k
| label
int64 0
1
| class
stringclasses 12
values | response
stringclasses 12
values |
---|---|---|---|
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 81, flow_bytes_toclient: 150, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9736565, event_type: dns, proto: UDP, dns_type: query, dns_id: 43882, dns_rrname: rtb.com.ru, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 9736579, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 43882, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: rtb.com.ru, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: rtb.com.ru, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 1089, dns_authorities_0_soa_mname: dns.fastdns24.com, dns_authorities_0_soa_rname: support.fastvps.ru, dns_authorities_0_soa_serial: 2015111820, dns_authorities_0_soa_refresh: 10800, dns_authorities_0_soa_retry: 3600, dns_authorities_0_soa_expire: 604800, dns_authorities_0_soa_minimum: 86400 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 144, flow_bytes_toclient: 176, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9736544, event_type: dns, proto: UDP, dns_type: query, dns_id: 16514, dns_rrname: videoseed.ru, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 9736545, event_type: dns, proto: UDP, dns_type: query, dns_id: 16514, dns_rrname: videoseed.ru, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 9736546, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 16514, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: videoseed.ru, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: videoseed.ru, dns_answers_0_rrtype: A, dns_answers_0_ttl: 4821, dns_answers_0_rdata: 212.224.113.74, dns_grouped_A_0: 212.224.113.74 ; pcap_cnt: 9736547, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 16514, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: videoseed.ru, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: videoseed.ru, dns_answers_0_rrtype: A, dns_answers_0_ttl: 4821, dns_answers_0_rdata: 212.224.113.74, dns_grouped_A_0: 212.224.113.74 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 142, flow_bytes_toclient: 206, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9740401, event_type: dns, proto: UDP, dns_type: query, dns_id: 18516, dns_rrname: spb.bid.run, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 9740402, event_type: dns, proto: UDP, dns_type: query, dns_id: 18516, dns_rrname: spb.bid.run, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 9740403, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 18516, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: spb.bid.run, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: spb.bid.run, dns_answers_0_rrtype: A, dns_answers_0_ttl: 483, dns_answers_0_rdata: 194.190.117.93, dns_answers_1_rrname: spb.bid.run, dns_answers_1_rrtype: A, dns_answers_1_ttl: 483, dns_answers_1_rdata: 194.190.117.94, dns_grouped_A_0: 194.190.117.93, dns_grouped_A_1: 194.190.117.94 ; pcap_cnt: 9740404, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 18516, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: spb.bid.run, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: spb.bid.run, dns_answers_0_rrtype: A, dns_answers_0_ttl: 483, dns_answers_0_rdata: 194.190.117.93, dns_answers_1_rrname: spb.bid.run, dns_answers_1_rrtype: A, dns_answers_1_ttl: 483, dns_answers_1_rdata: 194.190.117.94, dns_grouped_A_0: 194.190.117.93, dns_grouped_A_1: 194.190.117.94 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 8, flow_pkts_toclient: 8, flow_bytes_toserver: 791, flow_bytes_toclient: 3846, flow_age: 5, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 9741301, event_type: tls, proto: TCP, tls_session_resumed: True, tls_sni: stat.adlabs.ru, tls_version: TLS 1.2 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 10, flow_pkts_toclient: 10, flow_bytes_toserver: 1684, flow_bytes_toclient: 7104, flow_age: 4, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 9744403, event_type: tls, proto: TCP, tls_session_resumed: True, tls_sni: dmg.digitaltarget.ru, tls_version: TLS 1.2 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 7, flow_pkts_toclient: 8, flow_bytes_toserver: 1398, flow_bytes_toclient: 806, flow_age: 1, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 9745890, event_type: tls, proto: TCP, tls_session_resumed: True, tls_sni: js.himediads.com, tls_version: TLS 1.2 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 102, flow_bytes_toclient: 130, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9746161, event_type: dns, proto: UDP, dns_type: query, dns_id: 58473, dns_rrname: safebrowsing.cache.l.google.com, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 9746173, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 58473, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: safebrowsing.cache.l.google.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: safebrowsing.cache.l.google.com, dns_answers_0_rrtype: AAAA, dns_answers_0_ttl: 299, dns_answers_0_rdata: 2607:f8b0:4006:0811:0000:0000:0000:200e, dns_grouped_AAAA_0: 2607:f8b0:4006:0811:0000:0000:0000:200e | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 88, flow_bytes_toclient: 104, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9747538, event_type: dns, proto: UDP, dns_type: query, dns_id: 9435, dns_rrname: plus.l.google.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 9747553, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 9435, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: plus.l.google.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: plus.l.google.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 299, dns_answers_0_rdata: 172.217.10.46, dns_grouped_A_0: 172.217.10.46 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 9, flow_pkts_toclient: 6, flow_bytes_toserver: 1202, flow_bytes_toclient: 3355, flow_age: 5, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 9748904, event_type: tls, proto: TCP, tls_subject: OU=GT17523708, OU=See www.rapidssl.com/resources/cps (c)15, OU=Domain Control Validated - RapidSSL(R), CN=*.adsafeprotected.com, tls_issuerdn: C=US, O=GeoTrust Inc., CN=RapidSSL SHA256 CA - G3, tls_serial: 06:FE:62, tls_fingerprint: ed:e4:68:fa:6e:3c:f1:0e:45:3e:a7:5c:15:8e:36:eb:2e:ca:2a:65, tls_sni: pixel.adsafeprotected.com, tls_version: TLS 1.2, tls_notbefore: 2015-09-16T18:54:07, tls_notafter: 2018-09-18T19:15:05 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 182, flow_bytes_toclient: 214, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9751979, event_type: dns, proto: UDP, dns_type: query, dns_id: 5740, dns_rrname: s3-w.eu-central-1.amazonaws.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 9751980, event_type: dns, proto: UDP, dns_type: query, dns_id: 5740, dns_rrname: s3-w.eu-central-1.amazonaws.com, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 9751981, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 5740, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: s3-w.eu-central-1.amazonaws.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: s3-w.eu-central-1.amazonaws.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 1, dns_answers_0_rdata: 52.219.74.22, dns_grouped_A_0: 52.219.74.22 ; pcap_cnt: 9751982, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 5740, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: s3-w.eu-central-1.amazonaws.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: s3-w.eu-central-1.amazonaws.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 1, dns_answers_0_rdata: 52.219.74.22, dns_grouped_A_0: 52.219.74.22 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 170, flow_bytes_toclient: 202, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9756029, event_type: dns, proto: UDP, dns_type: query, dns_id: 64592, dns_rrname: iad08-bfp01.mediaplex.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 9756030, event_type: dns, proto: UDP, dns_type: query, dns_id: 64592, dns_rrname: iad08-bfp01.mediaplex.com, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 9756031, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 64592, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: iad08-bfp01.mediaplex.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: iad08-bfp01.mediaplex.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 2989, dns_answers_0_rdata: 205.180.85.157, dns_grouped_A_0: 205.180.85.157 ; pcap_cnt: 9756032, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 64592, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: iad08-bfp01.mediaplex.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: iad08-bfp01.mediaplex.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 2989, dns_answers_0_rdata: 205.180.85.157, dns_grouped_A_0: 205.180.85.157 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 156, flow_bytes_toclient: 188, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9757438, event_type: dns, proto: UDP, dns_type: query, dns_id: 35637, dns_rrname: bc.pressmatrix.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 9757439, event_type: dns, proto: UDP, dns_type: query, dns_id: 35637, dns_rrname: bc.pressmatrix.com, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 9757440, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 35637, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: bc.pressmatrix.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: bc.pressmatrix.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 2996, dns_answers_0_rdata: 88.198.233.8, dns_grouped_A_0: 88.198.233.8 ; pcap_cnt: 9757441, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 35637, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: bc.pressmatrix.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: bc.pressmatrix.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 2996, dns_answers_0_rdata: 88.198.233.8, dns_grouped_A_0: 88.198.233.8 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 166, flow_bytes_toclient: 222, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9761530, event_type: dns, proto: UDP, dns_type: query, dns_id: 11934, dns_rrname: youtube-ui.l.google.com, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 9761531, event_type: dns, proto: UDP, dns_type: query, dns_id: 11934, dns_rrname: youtube-ui.l.google.com, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 9761532, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 11934, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: youtube-ui.l.google.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: youtube-ui.l.google.com, dns_answers_0_rrtype: AAAA, dns_answers_0_ttl: 205, dns_answers_0_rdata: 2607:f8b0:4006:0802:0000:0000:0000:200e, dns_grouped_AAAA_0: 2607:f8b0:4006:0802:0000:0000:0000:200e ; pcap_cnt: 9761533, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 11934, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: youtube-ui.l.google.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: youtube-ui.l.google.com, dns_answers_0_rrtype: AAAA, dns_answers_0_ttl: 205, dns_answers_0_rdata: 2607:f8b0:4006:0802:0000:0000:0000:200e, dns_grouped_AAAA_0: 2607:f8b0:4006:0802:0000:0000:0000:200e | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 170, flow_bytes_toclient: 202, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9767455, event_type: dns, proto: UDP, dns_type: query, dns_id: 46286, dns_rrname: cs139.wac.edgecastcdn.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 9767456, event_type: dns, proto: UDP, dns_type: query, dns_id: 46286, dns_rrname: cs139.wac.edgecastcdn.net, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 9767457, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 46286, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: cs139.wac.edgecastcdn.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: cs139.wac.edgecastcdn.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 2171, dns_answers_0_rdata: 93.184.216.172, dns_grouped_A_0: 93.184.216.172 ; pcap_cnt: 9767458, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 46286, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: cs139.wac.edgecastcdn.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: cs139.wac.edgecastcdn.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 2171, dns_answers_0_rdata: 93.184.216.172, dns_grouped_A_0: 93.184.216.172 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 91, flow_bytes_toclient: 154, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9777053, event_type: dns, proto: UDP, dns_type: query, dns_id: 36195, dns_rrname: a1294.w20.akamai.net, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 9777068, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 36195, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: a1294.w20.akamai.net, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: w20.akamai.net, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 280, dns_authorities_0_soa_mname: n0w20.akamai.net, dns_authorities_0_soa_rname: hostmaster.akamai.com, dns_authorities_0_soa_serial: 1499455401, dns_authorities_0_soa_refresh: 1000, dns_authorities_0_soa_retry: 1000, dns_authorities_0_soa_expire: 1000, dns_authorities_0_soa_minimum: 1800 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 86, flow_bytes_toclient: 173, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9776431, event_type: dns, proto: UDP, dns_type: query, dns_id: 40132, dns_rrname: use.typekit.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 9776640, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 40132, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: use.typekit.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: use.typekit.net, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 26, dns_answers_0_rdata: use.typekit.net.edgekey.net, dns_answers_1_rrname: use.typekit.net.edgekey.net, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 6905, dns_answers_1_rdata: e8385.g.akamaiedge.net, dns_answers_2_rrname: e8385.g.akamaiedge.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 19, dns_answers_2_rdata: 104.97.117.153, dns_grouped_A_0: 104.97.117.153, dns_grouped_CNAME_0: use.typekit.net.edgekey.net, dns_grouped_CNAME_1: e8385.g.akamaiedge.net | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 144, flow_bytes_toclient: 290, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9779704, event_type: dns, proto: UDP, dns_type: query, dns_id: 21666, dns_rrname: ad.afy11.net, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 9779705, event_type: dns, proto: UDP, dns_type: query, dns_id: 21666, dns_rrname: ad.afy11.net, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 9779741, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 21666, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: ad.afy11.net, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: afy11.net, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 540, dns_authorities_0_soa_mname: ns1.p07.dynect.net, dns_authorities_0_soa_rname: hostmaster.adify.local, dns_authorities_0_soa_serial: 2017042500, dns_authorities_0_soa_refresh: 3600, dns_authorities_0_soa_retry: 600, dns_authorities_0_soa_expire: 604800, dns_authorities_0_soa_minimum: 1800 ; pcap_cnt: 9779742, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 21666, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: ad.afy11.net, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: afy11.net, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 540, dns_authorities_0_soa_mname: ns1.p07.dynect.net, dns_authorities_0_soa_rname: hostmaster.adify.local, dns_authorities_0_soa_serial: 2017042500, dns_authorities_0_soa_refresh: 3600, dns_authorities_0_soa_retry: 600, dns_authorities_0_soa_expire: 604800, dns_authorities_0_soa_minimum: 1800 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 94, flow_bytes_toclient: 158, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9780282, event_type: dns, proto: UDP, dns_type: query, dns_id: 46166, dns_rrname: stats.l.doubleclick.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 9780499, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 46166, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: stats.l.doubleclick.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: stats.l.doubleclick.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 299, dns_answers_0_rdata: 74.125.29.154, dns_answers_1_rrname: stats.l.doubleclick.net, dns_answers_1_rrtype: A, dns_answers_1_ttl: 299, dns_answers_1_rdata: 74.125.29.156, dns_answers_2_rrname: stats.l.doubleclick.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 299, dns_answers_2_rdata: 74.125.29.157, dns_answers_3_rrname: stats.l.doubleclick.net, dns_answers_3_rrtype: A, dns_answers_3_ttl: 299, dns_answers_3_rdata: 74.125.29.155, dns_grouped_A_0: 74.125.29.154, dns_grouped_A_1: 74.125.29.156, dns_grouped_A_2: 74.125.29.157, dns_grouped_A_3: 74.125.29.155 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 156, flow_bytes_toclient: 238, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9779994, event_type: dns, proto: UDP, dns_type: query, dns_id: 56135, dns_rrname: sync.go.sonobi.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 9779995, event_type: dns, proto: UDP, dns_type: query, dns_id: 56135, dns_rrname: sync.go.sonobi.com, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 9780089, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 56135, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: sync.go.sonobi.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: sync.go.sonobi.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 24, dns_answers_0_rdata: iad-2-sync.go.sonobi.com, dns_answers_1_rrname: iad-2-sync.go.sonobi.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 59, dns_answers_1_rdata: 69.166.1.10, dns_grouped_A_0: 69.166.1.10, dns_grouped_CNAME_0: iad-2-sync.go.sonobi.com ; pcap_cnt: 9780091, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 56135, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: sync.go.sonobi.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: sync.go.sonobi.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 24, dns_answers_0_rdata: iad-2-sync.go.sonobi.com, dns_answers_1_rrname: iad-2-sync.go.sonobi.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 59, dns_answers_1_rdata: 69.166.1.10, dns_grouped_CNAME_0: iad-2-sync.go.sonobi.com, dns_grouped_A_0: 69.166.1.10 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 162, flow_bytes_toclient: 194, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9784013, event_type: dns, proto: UDP, dns_type: query, dns_id: 20248, dns_rrname: www.barclaycardus.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 9784014, event_type: dns, proto: UDP, dns_type: query, dns_id: 20248, dns_rrname: www.barclaycardus.com, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 9784015, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 20248, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.barclaycardus.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: www.barclaycardus.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 517, dns_answers_0_rdata: 192.107.16.41, dns_grouped_A_0: 192.107.16.41 ; pcap_cnt: 9784016, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 20248, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.barclaycardus.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: www.barclaycardus.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 517, dns_answers_0_rdata: 192.107.16.41, dns_grouped_A_0: 192.107.16.41 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 178, flow_bytes_toclient: 340, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9785811, event_type: dns, proto: UDP, dns_type: query, dns_id: 35969, dns_rrname: d31qbv1cthcecs.cloudfront.net, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 9785812, event_type: dns, proto: UDP, dns_type: query, dns_id: 35969, dns_rrname: d31qbv1cthcecs.cloudfront.net, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 9785832, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 35969, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: d31qbv1cthcecs.cloudfront.net, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: d31qbv1cthcecs.cloudfront.net, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 509, dns_authorities_0_soa_mname: ns-162.awsdns-20.com, dns_authorities_0_soa_rname: awsdns-hostmaster.amazon.com, dns_authorities_0_soa_serial: 1, dns_authorities_0_soa_refresh: 7200, dns_authorities_0_soa_retry: 900, dns_authorities_0_soa_expire: 1209600, dns_authorities_0_soa_minimum: 86400 ; pcap_cnt: 9785833, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 35969, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: d31qbv1cthcecs.cloudfront.net, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: d31qbv1cthcecs.cloudfront.net, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 509, dns_authorities_0_soa_mname: ns-162.awsdns-20.com, dns_authorities_0_soa_rname: awsdns-hostmaster.amazon.com, dns_authorities_0_soa_serial: 1, dns_authorities_0_soa_refresh: 7200, dns_authorities_0_soa_retry: 900, dns_authorities_0_soa_expire: 1209600, dns_authorities_0_soa_minimum: 86400 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 130, flow_bytes_toclient: 130, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9793210, event_type: dns, proto: UDP, dns_type: query, dns_id: 65287, dns_rrname: macpc, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 9793211, event_type: dns, proto: UDP, dns_type: query, dns_id: 65287, dns_rrname: macpc, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 9793214, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 65287, dns_flags: 8182, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: macpc, dns_rrtype: AAAA, dns_rcode: SERVFAIL ; pcap_cnt: 9793215, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 65287, dns_flags: 8182, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: macpc, dns_rrtype: AAAA, dns_rcode: SERVFAIL | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 43, flow_pkts_toclient: 41, flow_bytes_toserver: 20364, flow_bytes_toclient: 9941, flow_age: 208, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1f, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 9794183, event_type: tls, proto: TCP, tls_subject: C=US, OID(2.5.4.17)=20190, ST=Virginia, L=Reston, OID(2.5.4.9)=Suite 600, OID(2.5.4.9)=11950 Democracy Drive, O=TMRG, OU=OSE, OU=PremiumSSL Wildcard, CN=*.scorecardresearch.com, tls_issuerdn: C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Organization Validation Secure Server CA, tls_serial: 00:E3:70:D3:D8:D1:C8:AE:13:EC:3E:95:F3:DD:9F:01:55, tls_fingerprint: c9:fe:c7:55:c4:96:14:fd:02:23:b4:94:ae:0c:f1:f3:07:d3:7c:66, tls_sni: sb.scorecardresearch.com, tls_version: TLS 1.2, tls_notbefore: 2016-12-20T00:00:00, tls_notafter: 2017-12-20T23:59:59 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 97, flow_bytes_toclient: 153, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9794712, event_type: dns, proto: UDP, dns_type: query, dns_id: 6688, dns_rrname: e8218.dscb1.akamaiedge.net, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 9794714, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 6688, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: e8218.dscb1.akamaiedge.net, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: e8218.dscb1.akamaiedge.net, dns_answers_0_rrtype: AAAA, dns_answers_0_ttl: 1, dns_answers_0_rdata: 2600:1408:e000:0182:0000:0000:0000:201a, dns_answers_1_rrname: e8218.dscb1.akamaiedge.net, dns_answers_1_rrtype: AAAA, dns_answers_1_ttl: 1, dns_answers_1_rdata: 2600:1408:e000:019a:0000:0000:0000:201a, dns_grouped_AAAA_0: 2600:1408:e000:0182:0000:0000:0000:201a, dns_grouped_AAAA_1: 2600:1408:e000:019a:0000:0000:0000:201a | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 98, flow_bytes_toclient: 126, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9801022, event_type: dns, proto: UDP, dns_type: query, dns_id: 56308, dns_rrname: star-mini.c10r.facebook.com, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 9801029, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 56308, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: star-mini.c10r.facebook.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: star-mini.c10r.facebook.com, dns_answers_0_rrtype: AAAA, dns_answers_0_ttl: 31, dns_answers_0_rdata: 2a03:2880:f112:0083:face:b00c:0000:25de, dns_grouped_AAAA_0: 2a03:2880:f112:0083:face:b00c:0000:25de | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 158, flow_bytes_toclient: 238, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9803499, event_type: dns, proto: UDP, dns_type: query, dns_id: 32902, dns_rrname: clients1.google.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 9803500, event_type: dns, proto: UDP, dns_type: query, dns_id: 32902, dns_rrname: clients1.google.com, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 9803501, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 32902, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: clients1.google.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: clients1.google.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 50, dns_answers_0_rdata: clients.l.google.com, dns_answers_1_rrname: clients.l.google.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 50, dns_answers_1_rdata: 172.217.11.14, dns_grouped_A_0: 172.217.11.14, dns_grouped_CNAME_0: clients.l.google.com ; pcap_cnt: 9803502, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 32902, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: clients1.google.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: clients1.google.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 50, dns_answers_0_rdata: clients.l.google.com, dns_answers_1_rrname: clients.l.google.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 50, dns_answers_1_rdata: 172.217.11.14, dns_grouped_A_0: 172.217.11.14, dns_grouped_CNAME_0: clients.l.google.com | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 21, flow_pkts_toclient: 20, flow_bytes_toserver: 1993, flow_bytes_toclient: 5596, flow_age: 115, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1f, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 9807223, event_type: tls, proto: TCP, tls_session_resumed: True, tls_sni: p.typekit.net, tls_version: TLS 1.2 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 43, flow_pkts_toclient: 46, flow_bytes_toserver: 5748, flow_bytes_toclient: 55959, flow_age: 126, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1f, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 9808163, event_type: tls, proto: TCP, tls_session_resumed: True, tls_sni: static2.cdn.ubi.com, tls_version: TLS 1.2 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 191, flow_bytes_toclient: 315, flow_age: 1, flow_state: established, flow_reason: timeout ; pcap_cnt: 9808674, event_type: dns, proto: UDP, dns_type: query, dns_id: 64122, dns_rrname: d361oi6ppvq2ym.cloudfront.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 9808733, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 64122, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: d361oi6ppvq2ym.cloudfront.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: d361oi6ppvq2ym.cloudfront.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 1, dns_answers_0_rdata: 54.230.38.43, dns_answers_1_rrname: d361oi6ppvq2ym.cloudfront.net, dns_answers_1_rrtype: A, dns_answers_1_ttl: 1, dns_answers_1_rdata: 54.230.38.191, dns_answers_2_rrname: d361oi6ppvq2ym.cloudfront.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 1, dns_answers_2_rdata: 54.230.38.77, dns_answers_3_rrname: d361oi6ppvq2ym.cloudfront.net, dns_answers_3_rrtype: A, dns_answers_3_ttl: 1, dns_answers_3_rdata: 54.230.38.95, dns_grouped_A_0: 54.230.38.43, dns_grouped_A_1: 54.230.38.191, dns_grouped_A_2: 54.230.38.77, dns_grouped_A_3: 54.230.38.95 ; pcap_cnt: 9809348, event_type: dns, proto: UDP, dns_type: query, dns_id: 37661, dns_rrname: uplayoverlay.ubi.com, dns_rrtype: AAAA, dns_tx_id: 2 ; pcap_cnt: 9809973, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 37661, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: uplayoverlay.ubi.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: ubi.com, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 3266, dns_authorities_0_soa_mname: nic7.ubisoft.com, dns_authorities_0_soa_rname: hostmaster.ubisoft.com, dns_authorities_0_soa_serial: 2017070607, dns_authorities_0_soa_refresh: 21600, dns_authorities_0_soa_retry: 3600, dns_authorities_0_soa_expire: 604800, dns_authorities_0_soa_minimum: 3600 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 174, flow_bytes_toclient: 206, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9809327, event_type: dns, proto: UDP, dns_type: query, dns_id: 16072, dns_rrname: ocsp.godaddy.com.akadns.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 9809328, event_type: dns, proto: UDP, dns_type: query, dns_id: 16072, dns_rrname: ocsp.godaddy.com.akadns.net, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 9809329, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 16072, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: ocsp.godaddy.com.akadns.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: ocsp.godaddy.com.akadns.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 1, dns_answers_0_rdata: 72.167.239.239, dns_grouped_A_0: 72.167.239.239 ; pcap_cnt: 9809330, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 16072, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: ocsp.godaddy.com.akadns.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: ocsp.godaddy.com.akadns.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 1, dns_answers_0_rdata: 72.167.239.239, dns_grouped_A_0: 72.167.239.239 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 172, flow_bytes_toclient: 284, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9810536, event_type: dns, proto: UDP, dns_type: query, dns_id: 11078, dns_rrname: e8218.dscb1.akamaiedge.net, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 9810537, event_type: dns, proto: UDP, dns_type: query, dns_id: 11078, dns_rrname: e8218.dscb1.akamaiedge.net, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 9810564, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 11078, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: e8218.dscb1.akamaiedge.net, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: e8218.dscb1.akamaiedge.net, dns_answers_0_rrtype: AAAA, dns_answers_0_ttl: 1, dns_answers_0_rdata: 2600:1408:e000:019a:0000:0000:0000:201a, dns_answers_1_rrname: e8218.dscb1.akamaiedge.net, dns_answers_1_rrtype: AAAA, dns_answers_1_ttl: 1, dns_answers_1_rdata: 2600:1408:e000:0182:0000:0000:0000:201a, dns_grouped_AAAA_0: 2600:1408:e000:019a:0000:0000:0000:201a, dns_grouped_AAAA_1: 2600:1408:e000:0182:0000:0000:0000:201a ; pcap_cnt: 9810565, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 11078, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: e8218.dscb1.akamaiedge.net, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: e8218.dscb1.akamaiedge.net, dns_answers_0_rrtype: AAAA, dns_answers_0_ttl: 1, dns_answers_0_rdata: 2600:1408:e000:019a:0000:0000:0000:201a, dns_answers_1_rrname: e8218.dscb1.akamaiedge.net, dns_answers_1_rrtype: AAAA, dns_answers_1_ttl: 1, dns_answers_1_rdata: 2600:1408:e000:0182:0000:0000:0000:201a, dns_grouped_AAAA_0: 2600:1408:e000:019a:0000:0000:0000:201a, dns_grouped_AAAA_1: 2600:1408:e000:0182:0000:0000:0000:201a | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 26, flow_pkts_toclient: 28, flow_bytes_toserver: 2275, flow_bytes_toclient: 20357, flow_age: 116, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1f, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 9811304, event_type: tls, proto: TCP, tls_session_resumed: True, tls_sni: i-ssl.ligatus.com, tls_version: TLS 1.2 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 172, flow_bytes_toclient: 236, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9812304, event_type: dns, proto: UDP, dns_type: query, dns_id: 56802, dns_rrname: code.jquery.netdna-cdn.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 9812305, event_type: dns, proto: UDP, dns_type: query, dns_id: 56802, dns_rrname: code.jquery.netdna-cdn.com, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 9812306, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 56802, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: code.jquery.netdna-cdn.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: code.jquery.netdna-cdn.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 158, dns_answers_0_rdata: 94.31.29.54, dns_answers_1_rrname: code.jquery.netdna-cdn.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 158, dns_answers_1_rdata: 198.232.125.113, dns_grouped_A_0: 94.31.29.54, dns_grouped_A_1: 198.232.125.113 ; pcap_cnt: 9812307, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 56802, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: code.jquery.netdna-cdn.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: code.jquery.netdna-cdn.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 158, dns_answers_0_rdata: 94.31.29.54, dns_answers_1_rrname: code.jquery.netdna-cdn.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 158, dns_answers_1_rdata: 198.232.125.113, dns_grouped_A_0: 94.31.29.54, dns_grouped_A_1: 198.232.125.113 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 20, flow_pkts_toclient: 18, flow_bytes_toserver: 2249, flow_bytes_toclient: 2154, flow_age: 116, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1f, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 9815130, event_type: tls, proto: TCP, tls_session_resumed: True, tls_sni: fattoquotidiano.disqus.com, tls_version: TLS 1.2 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 86, flow_bytes_toclient: 114, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9815621, event_type: dns, proto: UDP, dns_type: query, dns_id: 61273, dns_rrname: www.gstatic.com, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 9815655, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 61273, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.gstatic.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: www.gstatic.com, dns_answers_0_rrtype: AAAA, dns_answers_0_ttl: 56, dns_answers_0_rdata: 2607:f8b0:4006:0805:0000:0000:0000:2003, dns_grouped_AAAA_0: 2607:f8b0:4006:0805:0000:0000:0000:2003 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 10, flow_pkts_toclient: 11, flow_bytes_toserver: 1481, flow_bytes_toclient: 5466, flow_age: 31, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1e, tcp_tcp_flags_ts: 1a, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 9819372, event_type: tls, proto: TCP, tls_subject: C=FR, ST=Paris, L=Paris, O=CRITEO SA, OU=CRITEO SA, CN=*.criteo.net, tls_issuerdn: C=US, O=Symantec Corporation, OU=Symantec Trust Network, CN=Symantec Class 3 Secure Server CA - G4, tls_serial: 7B:F1:63:5E:DE:EA:A7:23:EB:3E:AA:A8:11:DA:0B:A8, tls_fingerprint: f1:07:27:8e:a4:17:0f:14:6c:29:e5:57:14:1d:ec:c3:ca:5d:39:bf, tls_sni: static.criteo.net, tls_version: TLS 1.2, tls_notbefore: 2017-01-10T00:00:00, tls_notafter: 2018-04-11T23:59:59 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 99, flow_bytes_toclient: 155, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9820326, event_type: dns, proto: UDP, dns_type: query, dns_id: 2513, dns_rrname: e12309.dsce12.akamaiedge.net, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 9820340, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 2513, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: e12309.dsce12.akamaiedge.net, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: e12309.dsce12.akamaiedge.net, dns_answers_0_rrtype: AAAA, dns_answers_0_ttl: 1, dns_answers_0_rdata: 2600:1408:e000:01bd:0000:0000:0000:3015, dns_answers_1_rrname: e12309.dsce12.akamaiedge.net, dns_answers_1_rrtype: AAAA, dns_answers_1_ttl: 1, dns_answers_1_rdata: 2600:1408:e000:019f:0000:0000:0000:3015, dns_grouped_AAAA_0: 2600:1408:e000:01bd:0000:0000:0000:3015, dns_grouped_AAAA_1: 2600:1408:e000:019f:0000:0000:0000:3015 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 9, flow_pkts_toclient: 7, flow_bytes_toserver: 875, flow_bytes_toclient: 3545, flow_age: 6, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1f, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 9822707, event_type: tls, proto: TCP, tls_session_resumed: True, tls_sni: px.demdex.net, tls_version: TLS 1.2 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 150, flow_bytes_toclient: 272, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9826442, event_type: dns, proto: UDP, dns_type: query, dns_id: 26041, dns_rrname: s.uuidksinc.net, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 9826443, event_type: dns, proto: UDP, dns_type: query, dns_id: 26041, dns_rrname: s.uuidksinc.net, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 9826449, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 26041, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: s.uuidksinc.net, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: uuidksinc.net, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 156, dns_authorities_0_soa_mname: ian.ns.cloudflare.com, dns_authorities_0_soa_rname: dns.cloudflare.com, dns_authorities_0_soa_serial: 2024176355, dns_authorities_0_soa_refresh: 10000, dns_authorities_0_soa_retry: 2400, dns_authorities_0_soa_expire: 604800, dns_authorities_0_soa_minimum: 3600 ; pcap_cnt: 9826450, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 26041, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: s.uuidksinc.net, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: uuidksinc.net, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 156, dns_authorities_0_soa_mname: ian.ns.cloudflare.com, dns_authorities_0_soa_rname: dns.cloudflare.com, dns_authorities_0_soa_serial: 2024176355, dns_authorities_0_soa_refresh: 10000, dns_authorities_0_soa_retry: 2400, dns_authorities_0_soa_expire: 604800, dns_authorities_0_soa_minimum: 3600 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 201, flow_bytes_toclient: 346, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9827064, event_type: dns, proto: UDP, dns_type: query, dns_id: 8298, dns_rrname: n2-r98d2.piguiqproxy.com, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 9827078, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 8298, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: n2-r98d2.piguiqproxy.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: n2-r98d2.piguiqproxy.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 1239, dns_answers_0_rdata: r98d2.piguiqproxy.com, dns_grouped_CNAME_0: r98d2.piguiqproxy.com, dns_authorities_0_rrname: piguiqproxy.com, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 1799, dns_authorities_0_soa_mname: nsa3.srv53.net, dns_authorities_0_soa_rname: support.dnshosting.org, dns_authorities_0_soa_serial: 1498020735, dns_authorities_0_soa_refresh: 1800, dns_authorities_0_soa_retry: 600, dns_authorities_0_soa_expire: 2419200, dns_authorities_0_soa_minimum: 1800 ; pcap_cnt: 9827165, event_type: dns, proto: UDP, dns_type: query, dns_id: 17095, dns_rrname: ocsp-ds.ws.symantec.com.edgekey.net, dns_rrtype: A, dns_tx_id: 2 ; pcap_cnt: 9827173, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 17095, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: ocsp-ds.ws.symantec.com.edgekey.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: ocsp-ds.ws.symantec.com.edgekey.net, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 1, dns_answers_0_rdata: e8218.dscb1.akamaiedge.net, dns_answers_1_rrname: e8218.dscb1.akamaiedge.net, dns_answers_1_rrtype: A, dns_answers_1_ttl: 1, dns_answers_1_rdata: 23.54.187.27, dns_grouped_A_0: 23.54.187.27, dns_grouped_CNAME_0: e8218.dscb1.akamaiedge.net | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 172, flow_bytes_toclient: 284, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9829618, event_type: dns, proto: UDP, dns_type: query, dns_id: 19870, dns_rrname: e8218.dscb1.akamaiedge.net, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 9829619, event_type: dns, proto: UDP, dns_type: query, dns_id: 19870, dns_rrname: e8218.dscb1.akamaiedge.net, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 9829620, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 19870, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: e8218.dscb1.akamaiedge.net, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: e8218.dscb1.akamaiedge.net, dns_answers_0_rrtype: AAAA, dns_answers_0_ttl: 0, dns_answers_0_rdata: 2600:1408:e000:0182:0000:0000:0000:201a, dns_answers_1_rrname: e8218.dscb1.akamaiedge.net, dns_answers_1_rrtype: AAAA, dns_answers_1_ttl: 0, dns_answers_1_rdata: 2600:1408:e000:019a:0000:0000:0000:201a, dns_grouped_AAAA_0: 2600:1408:e000:0182:0000:0000:0000:201a, dns_grouped_AAAA_1: 2600:1408:e000:019a:0000:0000:0000:201a ; pcap_cnt: 9829621, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 19870, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: e8218.dscb1.akamaiedge.net, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: e8218.dscb1.akamaiedge.net, dns_answers_0_rrtype: AAAA, dns_answers_0_ttl: 0, dns_answers_0_rdata: 2600:1408:e000:0182:0000:0000:0000:201a, dns_answers_1_rrname: e8218.dscb1.akamaiedge.net, dns_answers_1_rrtype: AAAA, dns_answers_1_ttl: 0, dns_answers_1_rdata: 2600:1408:e000:019a:0000:0000:0000:201a, dns_grouped_AAAA_0: 2600:1408:e000:0182:0000:0000:0000:201a, dns_grouped_AAAA_1: 2600:1408:e000:019a:0000:0000:0000:201a | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 24, flow_pkts_toclient: 24, flow_bytes_toserver: 2268, flow_bytes_toclient: 10117, flow_age: 116, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 9832422, event_type: tls, proto: TCP, tls_subject: C=CN, OID(2.5.4.17)=200070, ST=Shanghai, L=Shanghai, OID(2.5.4.9)=4F, No.585 Tianmu(M) Road, Zhabei District, O=MediaV Information Technology (Shanghai) Co.,Ltd., OU=OPS, OU=Multi-Domain SSL, CN=mediav.com, tls_issuerdn: C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Organization Validation Secure Server CA, tls_serial: 00:F4:82:D0:79:5A:0B:1D:A6:3A:C5:65:E3:ED:68:9B:7A, tls_fingerprint: 5f:c6:24:8f:ca:38:54:46:3b:02:4b:72:43:82:aa:07:ce:cf:9f:a7, tls_sni: show-g.mediav.com, tls_version: TLS 1.2, tls_notbefore: 2015-06-29T00:00:00, tls_notafter: 2018-06-25T23:59:59 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 9, flow_pkts_toclient: 8, flow_bytes_toserver: 1050, flow_bytes_toclient: 3841, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1f, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: last_ack ; pcap_cnt: 9834454, event_type: tls, proto: TCP, tls_session_resumed: True, tls_sni: strip.alicdn.com, tls_version: TLS 1.2 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 148, flow_bytes_toclient: 180, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9837653, event_type: dns, proto: UDP, dns_type: query, dns_id: 36184, dns_rrname: www.google.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 9837654, event_type: dns, proto: UDP, dns_type: query, dns_id: 36184, dns_rrname: www.google.com, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 9837655, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 36184, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.google.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: www.google.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 55, dns_answers_0_rdata: 216.58.217.164, dns_grouped_A_0: 216.58.217.164 ; pcap_cnt: 9837656, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 36184, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.google.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: www.google.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 55, dns_answers_0_rdata: 216.58.217.164, dns_grouped_A_0: 216.58.217.164 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 186, flow_bytes_toclient: 218, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9838517, event_type: dns, proto: UDP, dns_type: query, dns_id: 3043, dns_rrname: www-google-analytics.l.google.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 9838518, event_type: dns, proto: UDP, dns_type: query, dns_id: 3043, dns_rrname: www-google-analytics.l.google.com, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 9838519, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 3043, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www-google-analytics.l.google.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: www-google-analytics.l.google.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 0, dns_answers_0_rdata: 172.217.10.238, dns_grouped_A_0: 172.217.10.238 ; pcap_cnt: 9838520, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 3043, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www-google-analytics.l.google.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: www-google-analytics.l.google.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 0, dns_answers_0_rdata: 172.217.10.238, dns_grouped_A_0: 172.217.10.238 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 10, flow_pkts_toclient: 8, flow_bytes_toserver: 1718, flow_bytes_toclient: 5548, flow_age: 2, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1e, tcp_tcp_flags_ts: 1e, tcp_tcp_flags_tc: 1a, tcp_syn: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 9841764, event_type: tls, proto: TCP, tls_subject: OU=Domain Control Validated, OU=Issued through Brightcove Inc. E-PKI Manager, OU=COMODO SSL Wildcard, CN=*.brightcove.com, tls_issuerdn: C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Domain Validation Secure Server CA, tls_serial: 00:86:07:CA:50:51:9F:9F:C7:73:E8:0B:65:AC:A8:8A:6E, tls_fingerprint: e2:a4:48:b3:3b:9c:c5:a2:bc:4d:46:25:f8:72:8c:5b:29:53:a6:ff, tls_sni: metrics.brightcove.com, tls_version: TLS 1.2, tls_notbefore: 2016-04-21T00:00:00, tls_notafter: 2018-04-21T23:59:59 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 7, flow_pkts_toclient: 5, flow_bytes_toserver: 729, flow_bytes_toclient: 4292, flow_age: 1, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1e, tcp_tcp_flags_ts: 1e, tcp_tcp_flags_tc: 1a, tcp_syn: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 9842749, event_type: tls, proto: TCP, tls_sni: cx.atdmt.com, tls_version: UNDETERMINED | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 130, flow_bytes_toclient: 130, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9843339, event_type: dns, proto: UDP, dns_type: query, dns_id: 33043, dns_rrname: macpc, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 9843340, event_type: dns, proto: UDP, dns_type: query, dns_id: 33043, dns_rrname: macpc, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 9843343, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 33043, dns_flags: 8182, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: macpc, dns_rrtype: AAAA, dns_rcode: SERVFAIL ; pcap_cnt: 9843344, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 33043, dns_flags: 8182, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: macpc, dns_rrtype: AAAA, dns_rcode: SERVFAIL | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 94, flow_bytes_toclient: 110, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9844266, event_type: dns, proto: UDP, dns_type: query, dns_id: 15119, dns_rrname: e1879.e7.akamaiedge.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 9844275, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 15119, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: e1879.e7.akamaiedge.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: e1879.e7.akamaiedge.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 1, dns_answers_0_rdata: 23.192.9.190, dns_grouped_A_0: 23.192.9.190 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 144, flow_bytes_toclient: 242, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9849363, event_type: dns, proto: UDP, dns_type: query, dns_id: 31364, dns_rrname: ib.adnxs.com, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 9849364, event_type: dns, proto: UDP, dns_type: query, dns_id: 31364, dns_rrname: ib.adnxs.com, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 9849418, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 31364, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: ib.adnxs.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: ib.adnxs.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 4760, dns_answers_0_rdata: g.geogslb.com, dns_answers_1_rrname: g.geogslb.com, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 1320, dns_answers_1_rdata: ib.anycast.adnxs.com, dns_grouped_CNAME_0: g.geogslb.com, dns_grouped_CNAME_1: ib.anycast.adnxs.com ; pcap_cnt: 9849419, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 31364, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: ib.adnxs.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: ib.adnxs.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 4760, dns_answers_0_rdata: g.geogslb.com, dns_answers_1_rrname: g.geogslb.com, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 1320, dns_answers_1_rdata: ib.anycast.adnxs.com, dns_grouped_CNAME_0: g.geogslb.com, dns_grouped_CNAME_1: ib.anycast.adnxs.com | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 156, flow_bytes_toclient: 258, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9857538, event_type: dns, proto: UDP, dns_type: query, dns_id: 38479, dns_rrname: tags.crwdcntrl.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 9857539, event_type: dns, proto: UDP, dns_type: query, dns_id: 38479, dns_rrname: tags.crwdcntrl.net, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 9857540, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 38479, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: tags.crwdcntrl.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: tags.crwdcntrl.net, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 58135, dns_answers_0_rdata: cs84.wac.edgecastcdn.net, dns_answers_1_rrname: cs84.wac.edgecastcdn.net, dns_answers_1_rrtype: A, dns_answers_1_ttl: 2965, dns_answers_1_rdata: 72.21.91.113, dns_grouped_A_0: 72.21.91.113, dns_grouped_CNAME_0: cs84.wac.edgecastcdn.net ; pcap_cnt: 9857541, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 38479, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: tags.crwdcntrl.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: tags.crwdcntrl.net, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 58135, dns_answers_0_rdata: cs84.wac.edgecastcdn.net, dns_answers_1_rrname: cs84.wac.edgecastcdn.net, dns_answers_1_rrtype: A, dns_answers_1_ttl: 2965, dns_answers_1_rdata: 72.21.91.113, dns_grouped_CNAME_0: cs84.wac.edgecastcdn.net, dns_grouped_A_0: 72.21.91.113 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 22, flow_pkts_toclient: 21, flow_bytes_toserver: 2259, flow_bytes_toclient: 6743, flow_age: 181, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 9863303, event_type: tls, proto: TCP, tls_subject: C=US, ST=California, L=Mountain View, O=Google Inc, CN=*.googleapis.com, tls_issuerdn: C=US, O=Google Inc, CN=Google Internet Authority G2, tls_serial: 18:33:99:93:4C:28:3B:80, tls_fingerprint: d1:9c:65:c3:64:87:7e:97:93:9e:a0:83:0e:c3:8d:7c:98:72:dc:48, tls_sni: fonts.googleapis.com, tls_version: TLS 1.2, tls_notbefore: 2017-06-28T09:27:14, tls_notafter: 2017-09-20T09:26:00 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 162, flow_bytes_toclient: 194, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9866906, event_type: dns, proto: UDP, dns_type: query, dns_id: 31938, dns_rrname: scontent.xx.fbcdn.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 9866907, event_type: dns, proto: UDP, dns_type: query, dns_id: 31938, dns_rrname: scontent.xx.fbcdn.net, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 9866908, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 31938, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: scontent.xx.fbcdn.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: scontent.xx.fbcdn.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 36, dns_answers_0_rdata: 31.13.71.7, dns_grouped_A_0: 31.13.71.7 ; pcap_cnt: 9866909, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 31938, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: scontent.xx.fbcdn.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: scontent.xx.fbcdn.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 36, dns_answers_0_rdata: 31.13.71.7, dns_grouped_A_0: 31.13.71.7 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 99, flow_bytes_toclient: 184, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9869109, event_type: dns, proto: UDP, dns_type: query, dns_id: 340, dns_rrname: dcky6u1m8u6el.cloudfront.net, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 9869124, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 340, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: dcky6u1m8u6el.cloudfront.net, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: dcky6u1m8u6el.cloudfront.net, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 45, dns_authorities_0_soa_mname: ns-1336.awsdns-39.org, dns_authorities_0_soa_rname: awsdns-hostmaster.amazon.com, dns_authorities_0_soa_serial: 1, dns_authorities_0_soa_refresh: 7200, dns_authorities_0_soa_retry: 900, dns_authorities_0_soa_expire: 1209600, dns_authorities_0_soa_minimum: 86400 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 9, flow_pkts_toclient: 7, flow_bytes_toserver: 894, flow_bytes_toclient: 4112, flow_age: 6, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 9869142, event_type: tls, proto: TCP, tls_subject: C=US, ST=California, L=Mountain View, O=Mozilla Corporation, CN=*.cdn.mozilla.net, tls_issuerdn: C=US, O=DigiCert Inc, CN=DigiCert SHA2 Secure Server CA, tls_serial: 0C:A9:C6:43:61:BF:C9:2A:79:B1:DD:9C:FB:9E:48:EC, tls_fingerprint: e1:b5:16:2a:8f:de:d9:b8:28:7c:d1:aa:5f:43:5c:6b:e1:1d:8d:cb, tls_sni: tiles-cloudfront.cdn.mozilla.net, tls_version: TLS 1.2, tls_notbefore: 2016-11-03T00:00:00, tls_notafter: 2020-02-01T12:00:00 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 144, flow_bytes_toclient: 200, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9871756, event_type: dns, proto: UDP, dns_type: query, dns_id: 59930, dns_rrname: mc.yandex.ru, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 9871757, event_type: dns, proto: UDP, dns_type: query, dns_id: 59930, dns_rrname: mc.yandex.ru, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 9871760, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 59930, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: mc.yandex.ru, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: mc.yandex.ru, dns_answers_0_rrtype: AAAA, dns_answers_0_ttl: 1, dns_answers_0_rdata: 2a02:06b8:0000:0000:0000:0000:0001:0119, dns_grouped_AAAA_0: 2a02:06b8:0000:0000:0000:0000:0001:0119 ; pcap_cnt: 9871761, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 59930, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: mc.yandex.ru, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: mc.yandex.ru, dns_answers_0_rrtype: AAAA, dns_answers_0_ttl: 1, dns_answers_0_rdata: 2a02:06b8:0000:0000:0000:0000:0001:0119, dns_grouped_AAAA_0: 2a02:06b8:0000:0000:0000:0000:0001:0119 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 130, flow_bytes_toclient: 130, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9874785, event_type: dns, proto: UDP, dns_type: query, dns_id: 25697, dns_rrname: macpc, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 9874786, event_type: dns, proto: UDP, dns_type: query, dns_id: 25697, dns_rrname: macpc, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 9874789, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 25697, dns_flags: 8182, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: macpc, dns_rrtype: A, dns_rcode: SERVFAIL ; pcap_cnt: 9874790, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 25697, dns_flags: 8182, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: macpc, dns_rrtype: A, dns_rcode: SERVFAIL | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 17, flow_pkts_toclient: 15, flow_bytes_toserver: 1567, flow_bytes_toclient: 1794, flow_age: 116, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 9876237, event_type: http, proto: TCP, tx_id: 0, http_hostname: ocsp.digicert.com, http_url: /, http_http_user_agent: Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:54.0) Gecko/20100101 Firefox/54.0, http_http_content_type: application/ocsp-response, http_http_method: POST, http_protocol: HTTP/1.1, http_status: 200, http_length: 471 ; pcap_cnt: 9876237, event_type: fileinfo, proto: TCP, http_hostname: ocsp.digicert.com, http_url: /, http_http_user_agent: Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:54.0) Gecko/20100101 Firefox/54.0, http_http_content_type: application/ocsp-response, http_http_method: POST, http_protocol: HTTP/1.1, http_status: 200, http_length: 471, app_proto: http, fileinfo_filename: /, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 83, fileinfo_tx_id: 0 ; pcap_cnt: 9876349, event_type: fileinfo, proto: TCP, http_hostname: ocsp.digicert.com, http_url: /, http_http_user_agent: Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:54.0) Gecko/20100101 Firefox/54.0, http_http_content_type: application/ocsp-response, http_http_method: POST, http_protocol: HTTP/1.1, http_status: 200, http_length: 471, app_proto: http, fileinfo_filename: /, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 471, fileinfo_tx_id: 0 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 4, flow_pkts_toclient: 2, flow_bytes_toserver: 324, flow_bytes_toclient: 194, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9876956, event_type: dns, proto: UDP, dns_type: query, dns_id: 14847, dns_rrname: www.caisse-epargne.fr, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 9876957, event_type: dns, proto: UDP, dns_type: query, dns_id: 14847, dns_rrname: www.caisse-epargne.fr, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 9876962, event_type: dns, proto: UDP, dns_type: query, dns_id: 14847, dns_rrname: www.caisse-epargne.fr, dns_rrtype: A, dns_tx_id: 2 ; pcap_cnt: 9876963, event_type: dns, proto: UDP, dns_type: query, dns_id: 14847, dns_rrname: www.caisse-epargne.fr, dns_rrtype: A, dns_tx_id: 3 ; pcap_cnt: 9876966, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 14847, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.caisse-epargne.fr, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: www.caisse-epargne.fr, dns_answers_0_rrtype: A, dns_answers_0_ttl: 118, dns_answers_0_rdata: 91.135.176.224, dns_grouped_A_0: 91.135.176.224 ; pcap_cnt: 9876967, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 14847, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.caisse-epargne.fr, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: www.caisse-epargne.fr, dns_answers_0_rrtype: A, dns_answers_0_ttl: 118, dns_answers_0_rdata: 91.135.176.224, dns_grouped_A_0: 91.135.176.224 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 98, flow_bytes_toclient: 139, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9877501, event_type: dns, proto: UDP, dns_type: query, dns_id: 55191, dns_rrname: googleads.g.doubleclick.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 9877509, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 55191, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: googleads.g.doubleclick.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: googleads.g.doubleclick.net, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 58, dns_answers_0_rdata: pagead46.l.doubleclick.net, dns_answers_1_rrname: pagead46.l.doubleclick.net, dns_answers_1_rrtype: A, dns_answers_1_ttl: 154, dns_answers_1_rdata: 172.217.12.130, dns_grouped_A_0: 172.217.12.130, dns_grouped_CNAME_0: pagead46.l.doubleclick.net | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 146, flow_bytes_toclient: 178, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9877693, event_type: dns, proto: UDP, dns_type: query, dns_id: 9376, dns_rrname: www.google.ca, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 9877694, event_type: dns, proto: UDP, dns_type: query, dns_id: 9376, dns_rrname: www.google.ca, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 9877697, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 9376, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.google.ca, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: www.google.ca, dns_answers_0_rrtype: A, dns_answers_0_ttl: 198, dns_answers_0_rdata: 172.217.3.99, dns_grouped_A_0: 172.217.3.99 ; pcap_cnt: 9877698, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 9376, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.google.ca, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: www.google.ca, dns_answers_0_rrtype: A, dns_answers_0_ttl: 198, dns_answers_0_rdata: 172.217.3.99, dns_grouped_A_0: 172.217.3.99 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 85, flow_bytes_toclient: 113, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9877647, event_type: dns, proto: UDP, dns_type: query, dns_id: 53683, dns_rrname: www.google.com, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 9877661, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 53683, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.google.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: www.google.com, dns_answers_0_rrtype: AAAA, dns_answers_0_ttl: 299, dns_answers_0_rdata: 2607:f8b0:4006:0803:0000:0000:0000:2004, dns_grouped_AAAA_0: 2607:f8b0:4006:0803:0000:0000:0000:2004 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 84, flow_bytes_toclient: 100, flow_age: 1, flow_state: established, flow_reason: timeout ; pcap_cnt: 9880634, event_type: dns, proto: UDP, dns_type: query, dns_id: 34795, dns_rrname: tk.iogous.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 9880751, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 34795, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: tk.iogous.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: tk.iogous.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 59, dns_answers_0_rdata: 52.197.158.114, dns_grouped_A_0: 52.197.158.114 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 9, flow_pkts_toclient: 8, flow_bytes_toserver: 876, flow_bytes_toclient: 3977, flow_age: 7, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1f, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 9888639, event_type: tls, proto: TCP, tls_subject: OID(1.3.6.1.4.1.311.60.2.1.3)=JP, OID(2.5.4.15)=Private Organization, OID(2.5.4.5)=0100-01-067912, C=JP, ST=TOKYO, L=CHIYODA-KU, O=NTT DOCOMO, INC., OU=Innovation Management Department, CN=ec-concier.com, tls_issuerdn: C=US, O=Symantec Corporation, OU=Symantec Trust Network, CN=Symantec Class 3 EV SSL CA - G3, tls_serial: 0E:73:9E:DA:2C:D5:0E:8D:42:D3:5F:D7:AA:4D:DB:7B, tls_fingerprint: 5a:49:13:8e:42:59:26:97:13:38:9b:5f:fd:c5:5a:2e:9b:34:9b:cf, tls_sni: ec-concier.com, tls_version: TLS 1.2, tls_notbefore: 2017-04-12T00:00:00, tls_notafter: 2018-02-27T23:59:59 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 84, flow_bytes_toclient: 237, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9898697, event_type: dns, proto: UDP, dns_type: query, dns_id: 25064, dns_rrname: pbs.twimg.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 9898860, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 25064, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: pbs.twimg.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: pbs.twimg.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 74, dns_answers_0_rdata: cs196.wac.edgecastcdn.net, dns_answers_1_rrname: cs196.wac.edgecastcdn.net, dns_answers_1_rrtype: CNAME, dns_answers_1_ttl: 3478, dns_answers_1_rdata: cs2-wac.apr-8315.edgecastdns.net, dns_answers_2_rrname: cs2-wac.apr-8315.edgecastdns.net, dns_answers_2_rrtype: CNAME, dns_answers_2_ttl: 84, dns_answers_2_rdata: cs2-wac-us.8315.ecdns.net, dns_answers_3_rrname: cs2-wac-us.8315.ecdns.net, dns_answers_3_rrtype: CNAME, dns_answers_3_ttl: 298, dns_answers_3_rdata: cs45.wac.edgecastcdn.net, dns_answers_4_rrname: cs45.wac.edgecastcdn.net, dns_answers_4_rrtype: A, dns_answers_4_ttl: 2282, dns_answers_4_rdata: 72.21.91.70, dns_grouped_A_0: 72.21.91.70, dns_grouped_CNAME_0: cs196.wac.edgecastcdn.net, dns_grouped_CNAME_1: cs2-wac.apr-8315.edgecastdns.net, dns_grouped_CNAME_2: cs2-wac-us.8315.ecdns.net, dns_grouped_CNAME_3: cs45.wac.edgecastcdn.net | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 130, flow_bytes_toclient: 130, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9903076, event_type: dns, proto: UDP, dns_type: query, dns_id: 60110, dns_rrname: macpc, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 9903077, event_type: dns, proto: UDP, dns_type: query, dns_id: 60110, dns_rrname: macpc, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 9903080, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 60110, dns_flags: 8182, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: macpc, dns_rrtype: AAAA, dns_rcode: SERVFAIL ; pcap_cnt: 9903081, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 60110, dns_flags: 8182, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: macpc, dns_rrtype: AAAA, dns_rcode: SERVFAIL | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 8, flow_pkts_toclient: 7, flow_bytes_toserver: 1171, flow_bytes_toclient: 620, flow_age: 5, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 9904250, event_type: tls, proto: TCP, tls_session_resumed: True, tls_sni: tj.gongchang.com, tls_version: TLS 1.2 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 154, flow_bytes_toclient: 282, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9903604, event_type: dns, proto: UDP, dns_type: query, dns_id: 11182, dns_rrname: api.growingio.com, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 9903605, event_type: dns, proto: UDP, dns_type: query, dns_id: 11182, dns_rrname: api.growingio.com, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 9903623, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 11182, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: api.growingio.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: api.growingio.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 72403, dns_answers_0_rdata: elb-api-1433772507.cn-north-1.elb.amazonaws.com.cn, dns_grouped_CNAME_0: elb-api-1433772507.cn-north-1.elb.amazonaws.com.cn ; pcap_cnt: 9903624, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 11182, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: api.growingio.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: api.growingio.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 72403, dns_answers_0_rdata: elb-api-1433772507.cn-north-1.elb.amazonaws.com.cn, dns_grouped_CNAME_0: elb-api-1433772507.cn-north-1.elb.amazonaws.com.cn | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 186, flow_bytes_toclient: 218, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9911324, event_type: dns, proto: UDP, dns_type: query, dns_id: 65122, dns_rrname: www-google-analytics.l.google.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 9911325, event_type: dns, proto: UDP, dns_type: query, dns_id: 65122, dns_rrname: www-google-analytics.l.google.com, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 9911330, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 65122, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www-google-analytics.l.google.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: www-google-analytics.l.google.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 45, dns_answers_0_rdata: 172.217.12.206, dns_grouped_A_0: 172.217.12.206 ; pcap_cnt: 9911331, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 65122, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www-google-analytics.l.google.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: www-google-analytics.l.google.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 45, dns_answers_0_rdata: 172.217.12.206, dns_grouped_A_0: 172.217.12.206 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 154, flow_bytes_toclient: 186, flow_age: 1, flow_state: established, flow_reason: timeout ; pcap_cnt: 9913023, event_type: dns, proto: UDP, dns_type: query, dns_id: 62589, dns_rrname: rto.microsoft.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 9913024, event_type: dns, proto: UDP, dns_type: query, dns_id: 62589, dns_rrname: rto.microsoft.com, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 9913056, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 62589, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: rto.microsoft.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: rto.microsoft.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 2340, dns_answers_0_rdata: 207.46.96.206, dns_grouped_A_0: 207.46.96.206 ; pcap_cnt: 9913057, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 62589, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: rto.microsoft.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: rto.microsoft.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 2340, dns_answers_0_rdata: 207.46.96.206, dns_grouped_A_0: 207.46.96.206 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 98, flow_bytes_toclient: 169, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9912776, event_type: dns, proto: UDP, dns_type: query, dns_id: 58266, dns_rrname: eqv-520.eqv-rtb1.rfihub.com, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 9912831, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 58266, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: eqv-520.eqv-rtb1.rfihub.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: rfihub.com, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 1228, dns_authorities_0_soa_mname: edns102.ultradns.com, dns_authorities_0_soa_rname: ayoung.rocketfuel.com, dns_authorities_0_soa_serial: 2017062632, dns_authorities_0_soa_refresh: 86400, dns_authorities_0_soa_retry: 86400, dns_authorities_0_soa_expire: 86400, dns_authorities_0_soa_minimum: 86400 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 17, flow_pkts_toclient: 16, flow_bytes_toserver: 1725, flow_bytes_toclient: 6210, flow_age: 62, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 9916506, event_type: tls, proto: TCP, tls_subject: C=IL, OID(2.5.4.17)=6971920, ST=TEL AVIV-JAFFA, L=LONDONTEL AVIV-JAFFA, OID(2.5.4.9)=24 Wallenberg Raul, O=MY THINGS ISRAEL LTD, OU=Engineering, OU=PremiumSSL Wildcard, CN=*.mythings.com, tls_issuerdn: C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Organization Validation Secure Server CA, tls_serial: 00:EA:77:0F:41:02:1A:6F:62:B7:0B:72:14:4F:29:08:D6, tls_fingerprint: 09:54:55:0e:b3:8d:ba:70:ad:53:34:3d:75:53:f0:3a:e2:78:ef:f8, tls_sni: bidi-geo.mythings.com, tls_version: TLS 1.2, tls_notbefore: 2017-03-23T00:00:00, tls_notafter: 2020-06-04T23:59:59 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 13, flow_pkts_toclient: 11, flow_bytes_toserver: 1331, flow_bytes_toclient: 6944, flow_age: 1, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 9916519, event_type: tls, proto: TCP, tls_session_resumed: True, tls_sni: rtb-rubicon-user-sync.virool.com, tls_version: TLS 1.2 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 11, flow_pkts_toclient: 9, flow_bytes_toserver: 998, flow_bytes_toclient: 7166, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1f, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 9916616, event_type: tls, proto: TCP, tls_sni: idsync.rlcdn.com, tls_version: UNDETERMINED | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 12, flow_pkts_toclient: 14, flow_bytes_toserver: 3418, flow_bytes_toclient: 8628, flow_age: 10, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 9917815, event_type: tls, proto: TCP, tls_subject: C=US, ST=New York, L=New York, O=AppNexus, Inc., CN=*.adnxs.com, tls_issuerdn: C=US, O=GeoTrust Inc., CN=GeoTrust SSL CA - G3, tls_serial: 48:40:40:FB:7A:DD:CB:9D:E4:20:94:4D:C1:AF:F6:58, tls_fingerprint: ea:cb:61:b5:70:6d:a0:a2:a5:3a:4c:a4:e9:8a:e7:92:f5:1b:96:14, tls_sni: ib.adnxs.com, tls_version: TLS 1.2, tls_notbefore: 2016-02-25T00:00:00, tls_notafter: 2018-05-26T23:59:59 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 150, flow_bytes_toclient: 324, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9918663, event_type: dns, proto: UDP, dns_type: query, dns_id: 43360, dns_rrname: cosy.smaato.net, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 9918664, event_type: dns, proto: UDP, dns_type: query, dns_id: 43360, dns_rrname: cosy.smaato.net, dns_rrtype: AAAA, dns_tx_id: 1 ; pcap_cnt: 9918688, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 43360, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: cosy.smaato.net, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: smaato.net, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 17, dns_authorities_0_soa_mname: ns-1745.awsdns-26.co.uk, dns_authorities_0_soa_rname: awsdns-hostmaster.amazon.com, dns_authorities_0_soa_serial: 1, dns_authorities_0_soa_refresh: 7200, dns_authorities_0_soa_retry: 900, dns_authorities_0_soa_expire: 1209600, dns_authorities_0_soa_minimum: 86400 ; pcap_cnt: 9918689, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 43360, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: cosy.smaato.net, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: smaato.net, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 17, dns_authorities_0_soa_mname: ns-1745.awsdns-26.co.uk, dns_authorities_0_soa_rname: awsdns-hostmaster.amazon.com, dns_authorities_0_soa_serial: 1, dns_authorities_0_soa_refresh: 7200, dns_authorities_0_soa_retry: 900, dns_authorities_0_soa_expire: 1209600, dns_authorities_0_soa_minimum: 86400 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 6, flow_pkts_toclient: 5, flow_bytes_toserver: 982, flow_bytes_toclient: 1261, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 9926664, event_type: http, proto: TCP, tx_id: 0, http_hostname: ad.danawa.com, http_url: /RealMedia/ads/adstream_sx.ads/www.danawa.com/new_main@x42, http_http_user_agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_5_8) AppleWebKit/534.50.2 (KHTML, like Gecko) Version/5.0.6 Safari/533.22.3, http_http_content_type: text/html, http_http_refer: http://www.danawa.com/, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 548 ; pcap_cnt: 9926701, event_type: fileinfo, proto: TCP, http_hostname: ad.danawa.com, http_url: /RealMedia/ads/adstream_sx.ads/www.danawa.com/new_main@x42, http_http_user_agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_5_8) AppleWebKit/534.50.2 (KHTML, like Gecko) Version/5.0.6 Safari/533.22.3, http_http_content_type: text/html, http_http_refer: http://www.danawa.com/, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 548, app_proto: http, fileinfo_filename: /RealMedia/ads/adstream_sx.ads/www.danawa.com/new_main@x42, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 548, fileinfo_tx_id: 0 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: TCP, app_proto: ftp, flow_pkts_toserver: 22, flow_pkts_toclient: 28, flow_bytes_toserver: 1644, flow_bytes_toclient: 2304, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 9932940, event_type: ftp, proto: TCP, tx_id: 0, ftp_completion_code_0: 220, ftp_reply_0: (vsFTPd 3.0.3), ftp_reply_received: yes, ftp_reply_truncated: False ; pcap_cnt: 9932948, event_type: ftp, proto: TCP, tx_id: 1, ftp_command: USER, ftp_command_data: iscxtap, ftp_command_truncated: False, ftp_completion_code_0: 331, ftp_reply_0: Please specify the password., ftp_reply_received: yes, ftp_reply_truncated: False ; pcap_cnt: 9932970, event_type: ftp, proto: TCP, tx_id: 2, ftp_command: PASS, ftp_command_data: 1234, ftp_command_truncated: False, ftp_completion_code_0: 230, ftp_reply_0: Login successful., ftp_reply_received: yes, ftp_reply_truncated: False ; pcap_cnt: 9932976, event_type: ftp, proto: TCP, tx_id: 3, ftp_command: TYPE, ftp_command_data: I, ftp_command_truncated: False, ftp_completion_code_0: 200, ftp_reply_0: Switching to Binary mode., ftp_reply_received: yes, ftp_reply_truncated: False ; pcap_cnt: 9932985, event_type: ftp, proto: TCP, tx_id: 4, ftp_command: PASV, ftp_completion_code_0: 227, ftp_reply_0: Entering Passive Mode (192,168,10,50,183,152)., ftp_dynamic_port: 47000, ftp_reply_received: yes, ftp_reply_truncated: False ; pcap_cnt: 9933015, event_type: ftp, proto: TCP, tx_id: 5, ftp_command: STOR, ftp_command_data: 416f138ff54148a5806099a623e4e425.txt, ftp_command_truncated: False, ftp_completion_code_0: 150, ftp_completion_code_1: 226, ftp_reply_0: Ok to send data., ftp_reply_1: Transfer complete., ftp_reply_received: yes, ftp_reply_truncated: False ; pcap_cnt: 9933023, event_type: ftp, proto: TCP, tx_id: 6, ftp_command: QUIT, ftp_completion_code_0: 221, ftp_reply_0: Goodbye., ftp_reply_received: yes, ftp_reply_truncated: False | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 148, flow_bytes_toclient: 256, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9933096, event_type: dns, proto: UDP, dns_type: query, dns_id: 44835, dns_rrname: www.laposte.fr, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 9933097, event_type: dns, proto: UDP, dns_type: query, dns_id: 44835, dns_rrname: www.laposte.fr, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 9933098, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 44835, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.laposte.fr, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: www.laposte.fr, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 597, dns_answers_0_rdata: laposte.multimediabs.com, dns_answers_1_rrname: laposte.multimediabs.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 3597, dns_answers_1_rdata: 94.124.134.53, dns_grouped_CNAME_0: laposte.multimediabs.com, dns_grouped_A_0: 94.124.134.53 ; pcap_cnt: 9933099, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 44835, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: www.laposte.fr, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: www.laposte.fr, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 597, dns_answers_0_rdata: laposte.multimediabs.com, dns_answers_1_rrname: laposte.multimediabs.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 3597, dns_answers_1_rdata: 94.124.134.53, dns_grouped_CNAME_0: laposte.multimediabs.com, dns_grouped_A_0: 94.124.134.53 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 172, flow_bytes_toclient: 252, flow_age: 0, flow_state: established, flow_reason: timeout ; pcap_cnt: 9940594, event_type: dns, proto: UDP, dns_type: query, dns_id: 42665, dns_rrname: secure-it.imrworldwide.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 9940595, event_type: dns, proto: UDP, dns_type: query, dns_id: 42665, dns_rrname: secure-it.imrworldwide.com, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 9940608, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 42665, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: secure-it.imrworldwide.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: secure-it.imrworldwide.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 47120, dns_answers_0_rdata: secure-gl.imrworldwide.com, dns_answers_1_rrname: secure-gl.imrworldwide.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 15, dns_answers_1_rdata: 138.108.6.20, dns_grouped_CNAME_0: secure-gl.imrworldwide.com, dns_grouped_A_0: 138.108.6.20 ; pcap_cnt: 9940609, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 42665, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: secure-it.imrworldwide.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: secure-it.imrworldwide.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 47120, dns_answers_0_rdata: secure-gl.imrworldwide.com, dns_answers_1_rrname: secure-gl.imrworldwide.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 15, dns_answers_1_rdata: 138.108.6.20, dns_grouped_A_0: 138.108.6.20, dns_grouped_CNAME_0: secure-gl.imrworldwide.com | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 89, flow_bytes_toclient: 105, flow_age: 0, flow_state: established, flow_reason: shutdown ; pcap_cnt: 9943871, event_type: dns, proto: UDP, dns_type: query, dns_id: 38181, dns_rrname: pix-geo.revsci.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 9943883, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 38181, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: pix-geo.revsci.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: pix-geo.revsci.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 28, dns_answers_0_rdata: 38.72.130.139, dns_grouped_A_0: 38.72.130.139 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 10, flow_pkts_toclient: 12, flow_bytes_toserver: 1371, flow_bytes_toclient: 4750, flow_age: 2, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 9947584, event_type: tls, proto: TCP, tls_subject: C=GB, ST=London, L=London, O=Canonical Group Ltd, CN=videosearch.ubuntu.com, tls_issuerdn: C=US, O=DigiCert Inc, CN=DigiCert SHA2 Secure Server CA, tls_serial: 05:57:5D:56:47:3D:21:7F:01:4B:25:C3:0C:8C:60:4F, tls_fingerprint: db:56:7a:96:ea:72:e5:9e:09:91:11:cc:11:e6:3a:98:f6:d8:42:8f, tls_sni: videosearch.ubuntu.com, tls_version: TLS 1.2, tls_notbefore: 2017-06-19T00:00:00, tls_notafter: 2018-07-12T12:00:00 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 154, flow_bytes_toclient: 186, flow_age: 0, flow_state: established, flow_reason: shutdown ; pcap_cnt: 9948050, event_type: dns, proto: UDP, dns_type: query, dns_id: 29126, dns_rrname: ocsp.comodoca.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 9948051, event_type: dns, proto: UDP, dns_type: query, dns_id: 29126, dns_rrname: ocsp.comodoca.com, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 9948053, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 29126, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: ocsp.comodoca.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: ocsp.comodoca.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 9, dns_answers_0_rdata: 178.255.83.1, dns_grouped_A_0: 178.255.83.1 ; pcap_cnt: 9948054, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 29126, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: ocsp.comodoca.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: ocsp.comodoca.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 9, dns_answers_0_rdata: 178.255.83.1, dns_grouped_A_0: 178.255.83.1 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 177, flow_bytes_toclient: 294, flow_age: 147, flow_state: established, flow_reason: shutdown ; pcap_cnt: 9948525, event_type: dns, proto: UDP, dns_type: query, dns_id: 14108, dns_rrname: my.thaibuffer.com, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 9948542, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 14108, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: my.thaibuffer.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: my.thaibuffer.com, dns_answers_0_rrtype: AAAA, dns_answers_0_ttl: 299, dns_answers_0_rdata: 2400:cb00:2048:0001:0000:0000:681f:5a57, dns_answers_1_rrname: my.thaibuffer.com, dns_answers_1_rrtype: AAAA, dns_answers_1_ttl: 299, dns_answers_1_rdata: 2400:cb00:2048:0001:0000:0000:681f:5b57, dns_grouped_AAAA_0: 2400:cb00:2048:0001:0000:0000:681f:5a57, dns_grouped_AAAA_1: 2400:cb00:2048:0001:0000:0000:681f:5b57 ; pcap_cnt: 9981477, event_type: dns, proto: UDP, dns_type: query, dns_id: 11246, dns_rrname: a1485.b.akamai.net, dns_rrtype: AAAA, dns_tx_id: 2 ; pcap_cnt: 9981498, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 11246, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: a1485.b.akamai.net, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_authorities_0_rrname: b.akamai.net, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 589, dns_authorities_0_soa_mname: n0b.akamai.net, dns_authorities_0_soa_rname: hostmaster.akamai.com, dns_authorities_0_soa_serial: 1499457208, dns_authorities_0_soa_refresh: 1000, dns_authorities_0_soa_retry: 1000, dns_authorities_0_soa_expire: 1000, dns_authorities_0_soa_minimum: 1800 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 9, flow_pkts_toclient: 9, flow_bytes_toserver: 1759, flow_bytes_toclient: 4549, flow_age: 1, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 9956999, event_type: tls, proto: TCP, tls_session_resumed: True, tls_sni: tt1.zedo.com, tls_version: TLS 1.2 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 164, flow_bytes_toclient: 196, flow_age: 0, flow_state: established, flow_reason: shutdown ; pcap_cnt: 9956458, event_type: dns, proto: UDP, dns_type: query, dns_id: 56731, dns_rrname: e4937.d.akamaiedge.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 9956460, event_type: dns, proto: UDP, dns_type: query, dns_id: 56731, dns_rrname: e4937.d.akamaiedge.net, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 9956462, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 56731, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: e4937.d.akamaiedge.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: e4937.d.akamaiedge.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 19, dns_answers_0_rdata: 184.25.203.54, dns_grouped_A_0: 184.25.203.54 ; pcap_cnt: 9956463, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 56731, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: e4937.d.akamaiedge.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: e4937.d.akamaiedge.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 19, dns_answers_0_rdata: 184.25.203.54, dns_grouped_A_0: 184.25.203.54 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 102, flow_bytes_toclient: 130, flow_age: 0, flow_state: established, flow_reason: shutdown ; pcap_cnt: 9960717, event_type: dns, proto: UDP, dns_type: query, dns_id: 56513, dns_rrname: r19.sn-5hnednel.googlevideo.com, dns_rrtype: AAAA, dns_tx_id: 0 ; pcap_cnt: 9960722, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 56513, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: r19.sn-5hnednel.googlevideo.com, dns_rrtype: AAAA, dns_rcode: NOERROR, dns_answers_0_rrname: r19.sn-5hnednel.googlevideo.com, dns_answers_0_rrtype: AAAA, dns_answers_0_ttl: 1799, dns_answers_0_rdata: 2a00:1450:401c:001f:0000:0000:0000:0018, dns_grouped_AAAA_0: 2a00:1450:401c:001f:0000:0000:0000:0018 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 15, flow_pkts_toclient: 13, flow_bytes_toserver: 1470, flow_bytes_toclient: 7377, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1f, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 9962381, event_type: tls, proto: TCP, tls_subject: C=US, ST=California, L=Mountain View, O=Google Inc, CN=misc-sni.blogspot.com, tls_issuerdn: C=US, O=Google Inc, CN=Google Internet Authority G2, tls_serial: 77:79:5F:24:79:B9:CC:B9, tls_fingerprint: 34:7d:6e:fd:f2:ad:d9:05:dd:48:27:9e:ca:e6:b2:07:43:a0:5a:c0, tls_sni: www.blogspot.ca, tls_version: TLS 1.2, tls_notbefore: 2017-06-28T10:06:20, tls_notafter: 2017-09-20T09:27:00 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 6, flow_pkts_toclient: 5, flow_bytes_toserver: 999, flow_bytes_toclient: 1287, flow_age: 1, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 9963649, event_type: http, proto: TCP, tx_id: 0, http_hostname: ad.danawa.com, http_url: /RealMedia/ads/adstream_sx.ads/www.danawa.com/new_main@Middle, http_http_user_agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_5_8) AppleWebKit/534.50.2 (KHTML, like Gecko) Version/5.0.6 Safari/533.22.3, http_http_content_type: text/html, http_http_refer: http://www.danawa.com/, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 574 ; pcap_cnt: 9963789, event_type: fileinfo, proto: TCP, http_hostname: ad.danawa.com, http_url: /RealMedia/ads/adstream_sx.ads/www.danawa.com/new_main@Middle, http_http_user_agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_5_8) AppleWebKit/534.50.2 (KHTML, like Gecko) Version/5.0.6 Safari/533.22.3, http_http_content_type: text/html, http_http_refer: http://www.danawa.com/, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 574, app_proto: http, fileinfo_filename: /RealMedia/ads/adstream_sx.ads/www.danawa.com/new_main@Middle, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 574, fileinfo_tx_id: 0 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 23, flow_pkts_toclient: 23, flow_bytes_toserver: 2203, flow_bytes_toclient: 6710, flow_age: 116, flow_state: closed, flow_reason: shutdown, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1f, tcp_tcp_flags_tc: 1e, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 9967583, event_type: tls, proto: TCP, tls_subject: C=US, ST=New York, L=New York, O=CBS Broadcasting Inc., OU=Akamai SAN SSL OV, CN=www.cbs.com, tls_issuerdn: C=US, O=GeoTrust Inc., CN=GeoTrust SSL CA - G3, tls_serial: 15:C8:67:4C:C3:A2:49:AE:3E:AA:8C:A6:EA:00:22:89, tls_fingerprint: 25:8d:f2:3f:a2:8d:63:b8:0b:eb:94:69:a9:3a:47:08:3e:5a:0f:cd, tls_sni: static-3.tvgcdn.net, tls_version: TLS 1.2, tls_notbefore: 2017-03-31T00:00:00, tls_notafter: 2018-05-12T23:59:59 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 86, flow_bytes_toclient: 214, flow_age: 0, flow_state: established, flow_reason: shutdown ; pcap_cnt: 9968624, event_type: dns, proto: UDP, dns_type: query, dns_id: 17191, dns_rrname: cdn.viglink.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 9968786, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 17191, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: cdn.viglink.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: cdn.viglink.com, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 3236, dns_answers_0_rdata: cdn.viglink.com.cdn.cloudflare.net, dns_answers_1_rrname: cdn.viglink.com.cdn.cloudflare.net, dns_answers_1_rrtype: A, dns_answers_1_ttl: 299, dns_answers_1_rdata: 104.16.160.13, dns_answers_2_rrname: cdn.viglink.com.cdn.cloudflare.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 299, dns_answers_2_rdata: 104.16.163.13, dns_answers_3_rrname: cdn.viglink.com.cdn.cloudflare.net, dns_answers_3_rrtype: A, dns_answers_3_ttl: 299, dns_answers_3_rdata: 104.16.161.13, dns_answers_4_rrname: cdn.viglink.com.cdn.cloudflare.net, dns_answers_4_rrtype: A, dns_answers_4_ttl: 299, dns_answers_4_rdata: 104.16.162.13, dns_answers_5_rrname: cdn.viglink.com.cdn.cloudflare.net, dns_answers_5_rrtype: A, dns_answers_5_ttl: 299, dns_answers_5_rdata: 104.16.164.13, dns_grouped_CNAME_0: cdn.viglink.com.cdn.cloudflare.net, dns_grouped_A_0: 104.16.160.13, dns_grouped_A_1: 104.16.163.13, dns_grouped_A_2: 104.16.161.13, dns_grouped_A_3: 104.16.162.13, dns_grouped_A_4: 104.16.164.13 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 82, flow_bytes_toclient: 114, flow_age: 0, flow_state: established, flow_reason: shutdown ; pcap_cnt: 9968621, event_type: dns, proto: UDP, dns_type: query, dns_id: 19800, dns_rrname: vupulse.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 9968702, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 19800, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: vupulse.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: vupulse.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 299, dns_answers_0_rdata: 104.27.187.220, dns_answers_1_rrname: vupulse.com, dns_answers_1_rrtype: A, dns_answers_1_ttl: 299, dns_answers_1_rdata: 104.27.186.220, dns_grouped_A_0: 104.27.187.220, dns_grouped_A_1: 104.27.186.220 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 11, flow_pkts_toclient: 12, flow_bytes_toserver: 3228, flow_bytes_toclient: 6543, flow_age: 10, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 9970203, event_type: tls, proto: TCP, tls_subject: C=US, ST=New York, L=New York, O=AppNexus, Inc., CN=*.adnxs.com, tls_issuerdn: C=US, O=GeoTrust Inc., CN=GeoTrust SSL CA - G3, tls_serial: 48:40:40:FB:7A:DD:CB:9D:E4:20:94:4D:C1:AF:F6:58, tls_fingerprint: ea:cb:61:b5:70:6d:a0:a2:a5:3a:4c:a4:e9:8a:e7:92:f5:1b:96:14, tls_sni: ib.adnxs.com, tls_version: TLS 1.2, tls_notbefore: 2016-02-25T00:00:00, tls_notafter: 2018-05-26T23:59:59 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 1, flow_pkts_toclient: 1, flow_bytes_toserver: 101, flow_bytes_toclient: 147, flow_age: 0, flow_state: established, flow_reason: shutdown ; pcap_cnt: 9972925, event_type: dns, proto: UDP, dns_type: query, dns_id: 618, dns_rrname: c-bing-com.a-0001.a-msedge.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 9972949, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 618, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: c-bing-com.a-0001.a-msedge.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: c-bing-com.a-0001.a-msedge.net, dns_answers_0_rrtype: CNAME, dns_answers_0_ttl: 40, dns_answers_0_rdata: a-0001.a-msedge.net, dns_answers_1_rrname: a-0001.a-msedge.net, dns_answers_1_rrtype: A, dns_answers_1_ttl: 31, dns_answers_1_rdata: 204.79.197.200, dns_answers_2_rrname: a-0001.a-msedge.net, dns_answers_2_rrtype: A, dns_answers_2_ttl: 31, dns_answers_2_rdata: 13.107.21.200, dns_grouped_CNAME_0: a-0001.a-msedge.net, dns_grouped_A_0: 204.79.197.200, dns_grouped_A_1: 13.107.21.200 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 10, flow_pkts_toclient: 11, flow_bytes_toserver: 1109, flow_bytes_toclient: 4714, flow_age: 0, flow_state: closed, flow_reason: timeout, tcp_tcp_flags: 1f, tcp_tcp_flags_ts: 1f, tcp_tcp_flags_tc: 1f, tcp_syn: True, tcp_fin: True, tcp_rst: True, tcp_psh: True, tcp_ack: True, tcp_state: last_ack ; pcap_cnt: 9974575, event_type: tls, proto: TCP, tls_subject: C=US, ST=California, L=Menlo Park, O=Facebook, Inc., CN=*.atlassolutions.com, tls_issuerdn: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert SHA2 High Assurance Server CA, tls_serial: 04:1E:21:DD:D5:AC:24:06:DD:24:75:0A:A5:DC:19:CF, tls_fingerprint: e7:a0:58:00:18:e9:51:f0:b6:89:51:95:77:26:4f:d3:2f:c2:1e:ec, tls_sni: sig.atdmt.com, tls_version: TLS 1.2, tls_notbefore: 2017-04-27T00:00:00, tls_notafter: 2018-05-31T12:00:00 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: TCP, app_proto: http, flow_pkts_toserver: 7, flow_pkts_toclient: 5, flow_bytes_toserver: 1338, flow_bytes_toclient: 1621, flow_age: 15, flow_state: closed, flow_reason: shutdown, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 9982173, event_type: http, proto: TCP, tx_id: 0, http_hostname: ce.lijit.com, http_url: /merge?pid=5&3pid=8205a4mjmtl, http_http_user_agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:54.0) Gecko/20100101 Firefox/54.0, http_http_content_type: image/gif, http_http_refer: http://www.istockphoto.com/ca, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 43 ; pcap_cnt: 9987892, event_type: fileinfo, proto: TCP, http_hostname: ce.lijit.com, http_url: /merge?pid=5&3pid=8205a4mjmtl, http_http_user_agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:54.0) Gecko/20100101 Firefox/54.0, http_http_content_type: image/gif, http_http_refer: http://www.istockphoto.com/ca, http_http_method: GET, http_protocol: HTTP/1.1, http_status: 200, http_length: 43, app_proto: http, fileinfo_filename: /merge, fileinfo_gaps: False, fileinfo_state: CLOSED, fileinfo_stored: False, fileinfo_size: 43, fileinfo_tx_id: 0 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 164, flow_bytes_toclient: 196, flow_age: 0, flow_state: established, flow_reason: shutdown ; pcap_cnt: 9983475, event_type: dns, proto: UDP, dns_type: query, dns_id: 44604, dns_rrname: e3271.c.akamaiedge.net, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 9983476, event_type: dns, proto: UDP, dns_type: query, dns_id: 44604, dns_rrname: e3271.c.akamaiedge.net, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 9983477, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 44604, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: e3271.c.akamaiedge.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: e3271.c.akamaiedge.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 7, dns_answers_0_rdata: 23.204.71.122, dns_grouped_A_0: 23.204.71.122 ; pcap_cnt: 9983478, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 44604, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: e3271.c.akamaiedge.net, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: e3271.c.akamaiedge.net, dns_answers_0_rrtype: A, dns_answers_0_ttl: 7, dns_answers_0_rdata: 23.204.71.122, dns_grouped_A_0: 23.204.71.122 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 168, flow_bytes_toclient: 200, flow_age: 0, flow_state: established, flow_reason: shutdown ; pcap_cnt: 9986187, event_type: dns, proto: UDP, dns_type: query, dns_id: 43095, dns_rrname: pxtm.steelhousemedia.com, dns_rrtype: A, dns_tx_id: 0 ; pcap_cnt: 9986188, event_type: dns, proto: UDP, dns_type: query, dns_id: 43095, dns_rrname: pxtm.steelhousemedia.com, dns_rrtype: A, dns_tx_id: 1 ; pcap_cnt: 9986189, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 43095, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: pxtm.steelhousemedia.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: pxtm.steelhousemedia.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 22, dns_answers_0_rdata: 208.101.10.254, dns_grouped_A_0: 208.101.10.254 ; pcap_cnt: 9986190, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 43095, dns_flags: 8180, dns_qr: True, dns_rd: True, dns_ra: True, dns_rrname: pxtm.steelhousemedia.com, dns_rrtype: A, dns_rcode: NOERROR, dns_answers_0_rrname: pxtm.steelhousemedia.com, dns_answers_0_rrtype: A, dns_answers_0_ttl: 22, dns_answers_0_rdata: 208.101.10.254, dns_grouped_A_0: 208.101.10.254 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: UDP, app_proto: dns, flow_pkts_toserver: 2, flow_pkts_toclient: 2, flow_bytes_toserver: 186, flow_bytes_toclient: 308, flow_age: 0, flow_state: established, flow_reason: shutdown ; pcap_cnt: 9988350, event_type: dns, proto: UDP, dns_type: query, dns_id: 41526, dns_rrname: _kerberos-master._udp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 0 ; pcap_cnt: 9988351, event_type: dns, proto: UDP, dns_type: query, dns_id: 41526, dns_rrname: _kerberos-master._udp.TESTBED1.CA, dns_rrtype: SRV, dns_tx_id: 1 ; pcap_cnt: 9988352, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 41526, dns_flags: 8583, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _kerberos-master._udp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NXDOMAIN, dns_authorities_0_rrname: testbed1.ca, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 3600, dns_authorities_0_soa_mname: dc.testbed1.ca, dns_authorities_0_soa_rname: hostmaster.testbed1.ca, dns_authorities_0_soa_serial: 59, dns_authorities_0_soa_refresh: 900, dns_authorities_0_soa_retry: 600, dns_authorities_0_soa_expire: 86400, dns_authorities_0_soa_minimum: 3600 ; pcap_cnt: 9988353, event_type: dns, proto: UDP, dns_version: 2, dns_type: answer, dns_id: 41526, dns_flags: 8583, dns_qr: True, dns_aa: True, dns_rd: True, dns_ra: True, dns_rrname: _kerberos-master._udp.TESTBED1.CA, dns_rrtype: SRV, dns_rcode: NXDOMAIN, dns_authorities_0_rrname: testbed1.ca, dns_authorities_0_rrtype: SOA, dns_authorities_0_ttl: 3600, dns_authorities_0_soa_mname: dc.testbed1.ca, dns_authorities_0_soa_rname: hostmaster.testbed1.ca, dns_authorities_0_soa_serial: 59, dns_authorities_0_soa_refresh: 900, dns_authorities_0_soa_retry: 600, dns_authorities_0_soa_expire: 86400, dns_authorities_0_soa_minimum: 3600 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |
event_type: flow, proto: TCP, app_proto: tls, flow_pkts_toserver: 9, flow_pkts_toclient: 9, flow_bytes_toserver: 1407, flow_bytes_toclient: 4263, flow_age: 1, flow_state: closed, flow_reason: shutdown, tcp_tcp_flags: 1b, tcp_tcp_flags_ts: 1b, tcp_tcp_flags_tc: 1b, tcp_syn: True, tcp_fin: True, tcp_psh: True, tcp_ack: True, tcp_state: closed ; pcap_cnt: 9996418, event_type: tls, proto: TCP, tls_subject: C=FR, ST=Gironde, L=MERIGNAC, O=AT Internet, OU=Service Technique, CN=*.xiti.com, tls_issuerdn: C=US, O=thawte, Inc., CN=thawte SSL CA - G2, tls_serial: 65:44:2F:0D:0D:19:57:52:98:95:2C:1A:61:BE:2F:DF, tls_fingerprint: d2:62:91:26:cc:16:08:07:05:b9:3e:6f:11:da:4a:cb:d9:e9:0c:5e, tls_sni: logs1406.xiti.com, tls_version: TLS 1.2, tls_notbefore: 2016-03-23T00:00:00, tls_notafter: 2019-05-22T23:59:59 | 0 | BENIGN | Classification: Normal
The network event described in the Suricata logs indicates normal behavior. This classification implies that the observed network activity does not exhibit any characteristics associated with malicious intent or attack patterns. Typical signs of attacks, such as unusual traffic patterns, suspicious connection attempts, or abnormal data exchanges, are absent. The network interactions recorded in the logs conform to expected and legitimate usage patterns, suggesting routine and benign operations. |