No.
int64 1
117k
| Time
float64 0
6.94k
| Source
stringclasses 322
values | Destination
stringclasses 539
values | Protocol
stringclasses 59
values | Length
int64 42
6.05k
| Info
stringlengths 1
654
|
---|---|---|---|---|---|---|
362 | 22.250751 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53465 > 443 [RST] Seq=696 Win=0 Len=0 |
363 | 22.250849 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53465 > 443 [RST] Seq=696 Win=0 Len=0 |
364 | 22.25143 | 88.221.0.167 | 10.10.0.33 | TLSv1.2 | 1,514 | [TCP Spurious Retransmission] , Ignored Unknown Record |
365 | 22.251436 | 88.221.0.167 | 10.10.0.33 | TCP | 1,514 | [TCP Spurious Retransmission] 443 > 53465 [ACK] Seq=48286 Ack=696 Win=64128 Len=1460 |
366 | 22.251438 | 88.221.0.167 | 10.10.0.33 | TLSv1.2 | 1,514 | [TCP Spurious Retransmission] , Ignored Unknown Record |
367 | 22.25144 | 88.221.0.167 | 10.10.0.33 | TCP | 1,514 | [TCP Spurious Retransmission] 443 > 53465 [PSH, ACK] Seq=51206 Ack=696 Win=64128 Len=1460 |
368 | 22.251697 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53465 > 443 [RST] Seq=696 Win=0 Len=0 |
369 | 22.251824 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53465 > 443 [RST] Seq=696 Win=0 Len=0 |
370 | 22.251928 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53465 > 443 [RST] Seq=696 Win=0 Len=0 |
371 | 22.252039 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53465 > 443 [RST] Seq=696 Win=0 Len=0 |
372 | 22.252335 | 88.221.0.167 | 10.10.0.33 | TLSv1.2 | 1,514 | [TCP Spurious Retransmission] , Ignored Unknown Record |
373 | 22.252338 | 88.221.0.167 | 10.10.0.33 | TCP | 1,514 | [TCP Spurious Retransmission] 443 > 53465 [PSH, ACK] Seq=54126 Ack=696 Win=64128 Len=1460 |
374 | 22.252458 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53465 > 443 [RST] Seq=696 Win=0 Len=0 |
375 | 22.252569 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53465 > 443 [RST] Seq=696 Win=0 Len=0 |
376 | 22.252859 | 88.221.0.167 | 10.10.0.33 | TLSv1.2 | 1,514 | [TCP Spurious Retransmission] , Ignored Unknown Record |
377 | 22.252862 | 88.221.0.167 | 10.10.0.33 | TCP | 1,514 | [TCP Spurious Retransmission] 443 > 53465 [ACK] Seq=57046 Ack=696 Win=64128 Len=1460 |
378 | 22.252863 | 88.221.0.167 | 10.10.0.33 | TLSv1.2 | 1,514 | [TCP Spurious Retransmission] , Ignored Unknown Record |
379 | 22.252864 | 88.221.0.167 | 10.10.0.33 | TCP | 1,514 | [TCP Spurious Retransmission] 443 > 53465 [PSH, ACK] Seq=59966 Ack=696 Win=64128 Len=1460 |
380 | 22.252993 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53465 > 443 [RST] Seq=696 Win=0 Len=0 |
381 | 22.253094 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53465 > 443 [RST] Seq=696 Win=0 Len=0 |
382 | 22.253193 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53465 > 443 [RST] Seq=696 Win=0 Len=0 |
383 | 22.253291 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53465 > 443 [RST] Seq=696 Win=0 Len=0 |
384 | 22.253821 | 88.221.0.167 | 10.10.0.33 | TLSv1.2 | 1,514 | [TCP Spurious Retransmission] , Ignored Unknown Record |
385 | 22.253828 | 88.221.0.167 | 10.10.0.33 | TCP | 1,514 | [TCP Spurious Retransmission] 443 > 53465 [ACK] Seq=62886 Ack=696 Win=64128 Len=1460 |
386 | 22.25383 | 88.221.0.167 | 10.10.0.33 | TLSv1.2 | 1,514 | [TCP Spurious Retransmission] , Ignored Unknown Record |
387 | 22.253832 | 88.221.0.167 | 10.10.0.33 | TCP | 1,514 | [TCP Spurious Retransmission] 443 > 53465 [PSH, ACK] Seq=65806 Ack=696 Win=64128 Len=1460 |
388 | 22.254024 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53465 > 443 [RST] Seq=696 Win=0 Len=0 |
389 | 22.254128 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53465 > 443 [RST] Seq=696 Win=0 Len=0 |
390 | 22.254227 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53465 > 443 [RST] Seq=696 Win=0 Len=0 |
391 | 22.254325 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53465 > 443 [RST] Seq=696 Win=0 Len=0 |
392 | 22.254793 | 88.221.0.167 | 10.10.0.33 | TLSv1.2 | 1,514 | [TCP Spurious Retransmission] , Ignored Unknown Record |
393 | 22.2548 | 88.221.0.167 | 10.10.0.33 | TCP | 1,514 | [TCP Spurious Retransmission] 443 > 53465 [PSH, ACK] Seq=68726 Ack=697 Win=64128 Len=1460 |
394 | 22.254999 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53465 > 443 [RST] Seq=697 Win=0 Len=0 |
395 | 22.2551 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53465 > 443 [RST] Seq=697 Win=0 Len=0 |
396 | 22.621347 | 10.10.0.33 | 10.10.0.255 | NBNS | 110 | Registration NB GFBFPSXA<00> |
397 | 23.371591 | 10.10.0.33 | 10.10.0.255 | NBNS | 92 | Name query NB WORKGROUP<1c> |
398 | 24.136818 | 10.10.0.33 | 10.10.0.255 | NBNS | 92 | Name query NB WORKGROUP<1c> |
399 | 24.8869 | 10.10.0.33 | 10.10.0.255 | NBNS | 92 | Name query NB WORKGROUP<1c> |
400 | 25.64197 | 10.10.0.33 | 10.10.0.255 | NBNS | 92 | Name query NB WORKGROUP<1c> |
401 | 26.391539 | 10.10.0.33 | 10.10.0.255 | NBNS | 92 | Name query NB WORKGROUP<1c> |
402 | 27.15692 | 10.10.0.33 | 10.10.0.255 | NBNS | 92 | Name query NB WORKGROUP<1c> |
403 | 27.301031 | 10.10.0.33 | 88.221.0.167 | TCP | 66 | 53466 > 443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM |
404 | 27.31049 | 88.221.0.167 | 10.10.0.33 | TCP | 66 | 443 > 53466 [SYN, ACK] Seq=0 Ack=1 Win=64240 Len=0 MSS=1460 SACK_PERM WS=128 |
405 | 27.310879 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53466 > 443 [ACK] Seq=1 Ack=1 Win=65536 Len=0 |
406 | 27.311731 | 10.10.0.33 | 88.221.0.167 | TLSv1.2 | 427 | Client Hello (SNI=fs.microsoft.com) |
407 | 27.321157 | 88.221.0.167 | 10.10.0.33 | TCP | 54 | 443 > 53466 [ACK] Seq=1 Ack=374 Win=64128 Len=0 |
408 | 27.321515 | 88.221.0.167 | 10.10.0.33 | TLSv1.2 | 159 | Server Hello, Change Cipher Spec, Encrypted Handshake Message |
409 | 27.32291 | 10.10.0.33 | 88.221.0.167 | TLSv1.2 | 105 | Change Cipher Spec, Encrypted Handshake Message |
410 | 27.323787 | 10.10.0.33 | 88.221.0.167 | TLSv1.2 | 325 | Application Data |
411 | 27.332395 | 88.221.0.167 | 10.10.0.33 | TCP | 54 | 443 > 53466 [ACK] Seq=106 Ack=425 Win=64128 Len=0 |
412 | 27.333186 | 88.221.0.167 | 10.10.0.33 | TCP | 54 | 443 > 53466 [ACK] Seq=106 Ack=696 Win=64128 Len=0 |
413 | 27.334291 | 88.221.0.167 | 10.10.0.33 | TCP | 1,514 | 443 > 53466 [ACK] Seq=106 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 424] |
414 | 27.334294 | 88.221.0.167 | 10.10.0.33 | TCP | 1,514 | 443 > 53466 [ACK] Seq=1566 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 424] |
415 | 27.334296 | 88.221.0.167 | 10.10.0.33 | TCP | 1,514 | 443 > 53466 [ACK] Seq=3026 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 424] |
416 | 27.334298 | 88.221.0.167 | 10.10.0.33 | TCP | 1,514 | 443 > 53466 [PSH, ACK] Seq=4486 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 424] |
417 | 27.334314 | 88.221.0.167 | 10.10.0.33 | TCP | 1,514 | 443 > 53466 [ACK] Seq=5946 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 424] |
418 | 27.334315 | 88.221.0.167 | 10.10.0.33 | TCP | 1,514 | 443 > 53466 [ACK] Seq=7406 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 424] |
419 | 27.334317 | 88.221.0.167 | 10.10.0.33 | TCP | 1,514 | 443 > 53466 [ACK] Seq=8866 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 424] |
420 | 27.334318 | 88.221.0.167 | 10.10.0.33 | TCP | 1,514 | 443 > 53466 [PSH, ACK] Seq=10326 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 424] |
421 | 27.334331 | 88.221.0.167 | 10.10.0.33 | TCP | 1,514 | 443 > 53466 [ACK] Seq=11786 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 424] |
422 | 27.334332 | 88.221.0.167 | 10.10.0.33 | TCP | 1,514 | 443 > 53466 [ACK] Seq=13246 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 424] |
423 | 27.334355 | 88.221.0.167 | 10.10.0.33 | TCP | 1,514 | 443 > 53466 [ACK] Seq=14706 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 424] |
424 | 27.334357 | 88.221.0.167 | 10.10.0.33 | TLSv1.2 | 1,514 | Application Data |
425 | 27.334372 | 88.221.0.167 | 10.10.0.33 | TCP | 1,514 | 443 > 53466 [ACK] Seq=17626 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 439] |
426 | 27.334373 | 88.221.0.167 | 10.10.0.33 | TCP | 1,514 | 443 > 53466 [ACK] Seq=19086 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 439] |
427 | 27.334375 | 88.221.0.167 | 10.10.0.33 | TCP | 1,514 | 443 > 53466 [ACK] Seq=20546 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 439] |
428 | 27.334383 | 88.221.0.167 | 10.10.0.33 | TCP | 1,514 | 443 > 53466 [PSH, ACK] Seq=22006 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 439] |
429 | 27.334983 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53466 > 443 [ACK] Seq=696 Ack=3026 Win=65536 Len=0 |
430 | 27.335286 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53466 > 443 [ACK] Seq=696 Ack=5946 Win=65536 Len=0 |
431 | 27.33556 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53466 > 443 [ACK] Seq=696 Ack=8866 Win=65536 Len=0 |
432 | 27.335933 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53466 > 443 [ACK] Seq=696 Ack=11786 Win=65536 Len=0 |
433 | 27.337039 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53466 > 443 [ACK] Seq=696 Ack=14706 Win=65536 Len=0 |
434 | 27.337069 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53466 > 443 [ACK] Seq=696 Ack=17626 Win=65536 Len=0 |
435 | 27.337094 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53466 > 443 [ACK] Seq=696 Ack=20546 Win=65536 Len=0 |
436 | 27.337118 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53466 > 443 [ACK] Seq=696 Ack=23466 Win=65536 Len=0 |
437 | 27.337659 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53466 > 443 [FIN, ACK] Seq=696 Ack=23466 Win=65536 Len=0 |
438 | 27.344549 | 88.221.0.167 | 10.10.0.33 | TCP | 1,514 | 443 > 53466 [ACK] Seq=23466 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 439] |
439 | 27.344555 | 88.221.0.167 | 10.10.0.33 | TLSv1.2 | 1,514 | Application Data |
440 | 27.344556 | 88.221.0.167 | 10.10.0.33 | TCP | 1,514 | 443 > 53466 [ACK] Seq=26386 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 462] |
441 | 27.344557 | 88.221.0.167 | 10.10.0.33 | TCP | 1,514 | 443 > 53466 [PSH, ACK] Seq=27846 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 462] |
442 | 27.344738 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53466 > 443 [RST, ACK] Seq=697 Ack=24926 Win=0 Len=0 |
443 | 27.344881 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53466 > 443 [RST] Seq=696 Win=0 Len=0 |
444 | 27.34497 | 88.221.0.167 | 10.10.0.33 | TCP | 1,514 | [TCP Spurious Retransmission] 443 > 53466 [ACK] Seq=29306 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 462] |
445 | 27.344971 | 88.221.0.167 | 10.10.0.33 | TCP | 1,514 | [TCP Spurious Retransmission] 443 > 53466 [ACK] Seq=30766 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 462] |
446 | 27.344972 | 88.221.0.167 | 10.10.0.33 | TCP | 1,514 | [TCP Spurious Retransmission] 443 > 53466 [ACK] Seq=32226 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 462] |
447 | 27.344973 | 88.221.0.167 | 10.10.0.33 | TCP | 1,514 | [TCP Spurious Retransmission] 443 > 53466 [PSH, ACK] Seq=33686 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 462] |
448 | 27.345071 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53466 > 443 [RST] Seq=696 Win=0 Len=0 |
449 | 27.345166 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53466 > 443 [RST] Seq=696 Win=0 Len=0 |
450 | 27.345569 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53466 > 443 [RST] Seq=696 Win=0 Len=0 |
451 | 27.3456 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53466 > 443 [RST] Seq=696 Win=0 Len=0 |
452 | 27.345627 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53466 > 443 [RST] Seq=696 Win=0 Len=0 |
453 | 27.345653 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53466 > 443 [RST] Seq=696 Win=0 Len=0 |
454 | 27.345925 | 88.221.0.167 | 10.10.0.33 | TCP | 1,514 | [TCP Spurious Retransmission] 443 > 53466 [ACK] Seq=35146 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 462] |
455 | 27.345929 | 88.221.0.167 | 10.10.0.33 | TCP | 1,514 | [TCP Spurious Retransmission] 443 > 53466 [ACK] Seq=36606 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 462] |
456 | 27.34593 | 88.221.0.167 | 10.10.0.33 | TCP | 1,514 | [TCP Spurious Retransmission] 443 > 53466 [ACK] Seq=38066 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 462] |
457 | 27.345931 | 88.221.0.167 | 10.10.0.33 | TCP | 1,514 | [TCP Spurious Retransmission] 443 > 53466 [PSH, ACK] Seq=39526 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 462] |
458 | 27.346123 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53466 > 443 [RST] Seq=696 Win=0 Len=0 |
459 | 27.346243 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53466 > 443 [RST] Seq=696 Win=0 Len=0 |
460 | 27.346335 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53466 > 443 [RST] Seq=696 Win=0 Len=0 |
461 | 27.346425 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53466 > 443 [RST] Seq=696 Win=0 Len=0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.