No.
int64 1
117k
| Time
float64 0
6.94k
| Source
stringclasses 322
values | Destination
stringclasses 539
values | Protocol
stringclasses 59
values | Length
int64 42
6.05k
| Info
stringlengths 1
654
|
---|---|---|---|---|---|---|
462 | 27.346863 | 88.221.0.167 | 10.10.0.33 | TCP | 1,514 | [TCP Spurious Retransmission] 443 > 53466 [ACK] Seq=40986 Ack=696 Win=64128 Len=1460 |
463 | 27.346866 | 88.221.0.167 | 10.10.0.33 | TCP | 1,514 | [TCP Spurious Retransmission] 443 > 53466 [ACK] Seq=42446 Ack=696 Win=64128 Len=1460 |
464 | 27.346867 | 88.221.0.167 | 10.10.0.33 | TLSv1.2 | 1,514 | [TCP Spurious Retransmission] , Ignored Unknown Record |
465 | 27.346868 | 88.221.0.167 | 10.10.0.33 | TCP | 1,514 | [TCP Spurious Retransmission] 443 > 53466 [PSH, ACK] Seq=45366 Ack=696 Win=64128 Len=1460 |
466 | 27.347032 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53466 > 443 [RST] Seq=696 Win=0 Len=0 |
467 | 27.347139 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53466 > 443 [RST] Seq=696 Win=0 Len=0 |
468 | 27.347231 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53466 > 443 [RST] Seq=696 Win=0 Len=0 |
469 | 27.347322 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53466 > 443 [RST] Seq=696 Win=0 Len=0 |
470 | 27.347776 | 88.221.0.167 | 10.10.0.33 | TLSv1.2 | 1,514 | [TCP Spurious Retransmission] , Ignored Unknown Record |
471 | 27.347778 | 88.221.0.167 | 10.10.0.33 | TCP | 1,514 | [TCP Spurious Retransmission] 443 > 53466 [ACK] Seq=48286 Ack=696 Win=64128 Len=1460 |
472 | 27.347779 | 88.221.0.167 | 10.10.0.33 | TLSv1.2 | 1,514 | [TCP Spurious Retransmission] , Ignored Unknown Record |
473 | 27.34778 | 88.221.0.167 | 10.10.0.33 | TCP | 1,514 | [TCP Spurious Retransmission] 443 > 53466 [PSH, ACK] Seq=51206 Ack=696 Win=64128 Len=1460 |
474 | 27.348002 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53466 > 443 [RST] Seq=696 Win=0 Len=0 |
475 | 27.348182 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53466 > 443 [RST] Seq=696 Win=0 Len=0 |
476 | 27.348293 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53466 > 443 [RST] Seq=696 Win=0 Len=0 |
477 | 27.34839 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53466 > 443 [RST] Seq=696 Win=0 Len=0 |
478 | 27.348707 | 88.221.0.167 | 10.10.0.33 | TLSv1.2 | 1,514 | [TCP Spurious Retransmission] , Ignored Unknown Record |
479 | 27.34871 | 88.221.0.167 | 10.10.0.33 | TCP | 1,514 | [TCP Spurious Retransmission] 443 > 53466 [PSH, ACK] Seq=54126 Ack=696 Win=64128 Len=1460 |
480 | 27.348844 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53466 > 443 [RST] Seq=696 Win=0 Len=0 |
481 | 27.348956 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53466 > 443 [RST] Seq=696 Win=0 Len=0 |
482 | 27.349183 | 88.221.0.167 | 10.10.0.33 | TLSv1.2 | 1,514 | [TCP Spurious Retransmission] , Ignored Unknown Record |
483 | 27.349186 | 88.221.0.167 | 10.10.0.33 | TCP | 1,514 | [TCP Spurious Retransmission] 443 > 53466 [ACK] Seq=57046 Ack=696 Win=64128 Len=1460 |
484 | 27.349187 | 88.221.0.167 | 10.10.0.33 | TLSv1.2 | 1,514 | [TCP Spurious Retransmission] , Ignored Unknown Record |
485 | 27.349188 | 88.221.0.167 | 10.10.0.33 | TCP | 1,514 | [TCP Spurious Retransmission] 443 > 53466 [PSH, ACK] Seq=59966 Ack=696 Win=64128 Len=1460 |
486 | 27.349306 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53466 > 443 [RST] Seq=696 Win=0 Len=0 |
487 | 27.349399 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53466 > 443 [RST] Seq=696 Win=0 Len=0 |
488 | 27.349525 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53466 > 443 [RST] Seq=696 Win=0 Len=0 |
489 | 27.349622 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53466 > 443 [RST] Seq=696 Win=0 Len=0 |
490 | 27.350115 | 88.221.0.167 | 10.10.0.33 | TLSv1.2 | 1,514 | [TCP Spurious Retransmission] , Ignored Unknown Record |
491 | 27.350117 | 88.221.0.167 | 10.10.0.33 | TCP | 1,514 | [TCP Spurious Retransmission] 443 > 53466 [ACK] Seq=62886 Ack=697 Win=64128 Len=1460 |
492 | 27.350118 | 88.221.0.167 | 10.10.0.33 | TLSv1.2 | 1,514 | [TCP Spurious Retransmission] , Ignored Unknown Record |
493 | 27.350119 | 88.221.0.167 | 10.10.0.33 | TCP | 1,514 | [TCP Spurious Retransmission] 443 > 53466 [PSH, ACK] Seq=65806 Ack=697 Win=64128 Len=1460 |
494 | 27.350233 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53466 > 443 [RST] Seq=697 Win=0 Len=0 |
495 | 27.350323 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53466 > 443 [RST] Seq=697 Win=0 Len=0 |
496 | 27.350441 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53466 > 443 [RST] Seq=697 Win=0 Len=0 |
497 | 27.350552 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53466 > 443 [RST] Seq=697 Win=0 Len=0 |
498 | 27.351034 | 88.221.0.167 | 10.10.0.33 | TLSv1.2 | 1,514 | [TCP Spurious Retransmission] , Ignored Unknown Record |
499 | 27.351037 | 88.221.0.167 | 10.10.0.33 | TCP | 1,514 | [TCP Spurious Retransmission] 443 > 53466 [PSH, ACK] Seq=68726 Ack=697 Win=64128 Len=1460 |
500 | 27.351193 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53466 > 443 [RST] Seq=697 Win=0 Len=0 |
501 | 27.351286 | 10.10.0.33 | 88.221.0.167 | TCP | 60 | 53466 > 443 [RST] Seq=697 Win=0 Len=0 |
502 | 27.613399 | 10.10.0.33 | 8.8.8.8 | DNS | 72 | Standard query 0xbfa0 A api.bing.com |
503 | 27.615671 | 10.10.0.33 | 8.8.8.8 | DNS | 72 | Standard query 0x97c6 A www.bing.com |
504 | 27.618657 | 8.8.8.8 | 10.10.0.33 | DNS | 148 | Standard query response 0xbfa0 A api.bing.com CNAME api-bing-com.e-0001.e-msedge.net CNAME e-0001.e-msedge.net A 13.107.5.80 |
505 | 27.626439 | 8.8.8.8 | 10.10.0.33 | DNS | 220 | Standard query response 0x97c6 A www.bing.com CNAME a-0001.a-afdentry.net.trafficmanager.net CNAME www-bing-com.dual-a-0001.a-msedge.net CNAME dual-a-0001.a-msedge.net A 204.79.197.200 A 13.107.21.200 |
506 | 28.46625 | 10.10.0.33 | 10.10.0.255 | NBNS | 92 | Name query NB WORKGROUP<1c> |
507 | 29.20377 | 10.10.0.33 | 10.10.0.255 | NBNS | 92 | Name query NB WORKGROUP<1c> |
508 | 30.000882 | 10.10.0.33 | 10.10.0.255 | NBNS | 92 | Name query NB WORKGROUP<1c> |
509 | 41.895748 | 10.10.0.33 | 8.8.8.8 | DNS | 82 | Standard query 0x6855 A iecvlist.microsoft.com |
510 | 41.900864 | 8.8.8.8 | 10.10.0.33 | DNS | 164 | Standard query response 0x6855 A iecvlist.microsoft.com CNAME ie9comview.vo.msecnd.net CNAME cs9.wpc.v0cdn.net A 72.21.81.200 |
511 | 41.903754 | 10.10.0.33 | 72.21.81.200 | TCP | 66 | 53467 > 443 [SYN] Seq=0 Win=65535 Len=0 MSS=1460 WS=8 SACK_PERM |
512 | 41.973886 | 72.21.81.200 | 10.10.0.33 | TCP | 66 | 443 > 53467 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=1460 SACK_PERM WS=512 |
513 | 41.974208 | 10.10.0.33 | 72.21.81.200 | TCP | 60 | 53467 > 443 [ACK] Seq=1 Ack=1 Win=262144 Len=0 |
514 | 41.97864 | 10.10.0.33 | 72.21.81.200 | TLSv1.2 | 247 | Client Hello (SNI=iecvlist.microsoft.com) |
515 | 42.048737 | 72.21.81.200 | 10.10.0.33 | TCP | 54 | 443 > 53467 [ACK] Seq=1 Ack=194 Win=67072 Len=0 |
516 | 42.048849 | 72.21.81.200 | 10.10.0.33 | TLSv1.2 | 1,514 | Server Hello |
517 | 42.048853 | 72.21.81.200 | 10.10.0.33 | TCP | 1,514 | 443 > 53467 [PSH, ACK] Seq=1461 Ack=194 Win=67072 Len=1460 [TCP PDU reassembled in 523] |
518 | 42.048858 | 72.21.81.200 | 10.10.0.33 | TCP | 1,230 | 443 > 53467 [PSH, ACK] Seq=2921 Ack=194 Win=67072 Len=1176 [TCP PDU reassembled in 523] |
519 | 42.049139 | 10.10.0.33 | 72.21.81.200 | TCP | 60 | 53467 > 443 [ACK] Seq=194 Ack=1461 Win=262144 Len=0 |
520 | 42.049265 | 10.10.0.33 | 72.21.81.200 | TCP | 60 | 53467 > 443 [ACK] Seq=194 Ack=2921 Win=262144 Len=0 |
521 | 42.049399 | 10.10.0.33 | 72.21.81.200 | TCP | 60 | 53467 > 443 [ACK] Seq=194 Ack=4097 Win=260968 Len=0 |
522 | 42.04973 | 72.21.81.200 | 10.10.0.33 | TCP | 1,514 | 443 > 53467 [ACK] Seq=4097 Ack=194 Win=67072 Len=1460 [TCP PDU reassembled in 523] |
523 | 42.049734 | 72.21.81.200 | 10.10.0.33 | TLSv1.2 | 1,514 | Certificate, Certificate Status |
524 | 42.049739 | 72.21.81.200 | 10.10.0.33 | TLSv1.2 | 213 | Server Key Exchange, Server Hello Done |
525 | 42.049876 | 10.10.0.33 | 72.21.81.200 | TCP | 60 | 53467 > 443 [ACK] Seq=194 Ack=5557 Win=262144 Len=0 |
526 | 42.049988 | 10.10.0.33 | 72.21.81.200 | TCP | 60 | 53467 > 443 [ACK] Seq=194 Ack=7017 Win=262144 Len=0 |
527 | 42.050089 | 10.10.0.33 | 72.21.81.200 | TCP | 60 | 53467 > 443 [ACK] Seq=194 Ack=7176 Win=261984 Len=0 |
528 | 42.104861 | 10.10.0.33 | 8.8.8.8 | DNS | 83 | Standard query 0x025b A ctldl.windowsupdate.com |
529 | 42.106486 | 8.8.8.8 | 10.10.0.33 | DNS | 312 | Standard query response 0x025b A ctldl.windowsupdate.com CNAME au-bg-shim.trafficmanager.net CNAME audownload.windowsupdate.nsatc.net CNAME auto.au.download.windowsupdate.com.c.footprint.net A 67.27.153.254 A 8.247.211.254 A 67.27.153.126 A 8.253.208.113 A 8.238.23.254 |
530 | 42.107321 | 10.10.0.33 | 67.27.153.254 | TCP | 66 | 53468 > 80 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM |
531 | 42.111164 | 67.27.153.254 | 10.10.0.33 | TCP | 66 | 80 > 53468 [SYN, ACK] Seq=0 Ack=1 Win=64240 Len=0 MSS=1460 SACK_PERM WS=128 |
532 | 42.111326 | 10.10.0.33 | 67.27.153.254 | TCP | 60 | 53468 > 80 [ACK] Seq=1 Ack=1 Win=65536 Len=0 |
533 | 42.111561 | 10.10.0.33 | 67.27.153.254 | HTTP | 299 | GET /msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?89bc06da51a9484f HTTP/1.1 |
534 | 42.115495 | 67.27.153.254 | 10.10.0.33 | TCP | 54 | 80 > 53468 [ACK] Seq=1 Ack=246 Win=64000 Len=0 |
535 | 42.116589 | 67.27.153.254 | 10.10.0.33 | TCP | 1,514 | 80 > 53468 [ACK] Seq=1 Ack=246 Win=64128 Len=1460 [TCP PDU reassembled in 538] |
536 | 42.116595 | 67.27.153.254 | 10.10.0.33 | TCP | 1,514 | 80 > 53468 [ACK] Seq=1461 Ack=246 Win=64128 Len=1460 [TCP PDU reassembled in 538] |
537 | 42.116596 | 67.27.153.254 | 10.10.0.33 | TCP | 1,514 | 80 > 53468 [ACK] Seq=2921 Ack=246 Win=64128 Len=1460 [TCP PDU reassembled in 538] |
538 | 42.116597 | 67.27.153.254 | 10.10.0.33 | HTTP | 910 | HTTP/1.1 200 OK (application/vnd.ms-cab-compressed) |
539 | 42.11687 | 10.10.0.33 | 67.27.153.254 | TCP | 60 | 53468 > 80 [ACK] Seq=246 Ack=2921 Win=65536 Len=0 |
540 | 42.117057 | 10.10.0.33 | 67.27.153.254 | TCP | 60 | 53468 > 80 [ACK] Seq=246 Ack=5237 Win=65536 Len=0 |
541 | 42.162625 | 10.10.0.33 | 8.8.8.8 | DNS | 77 | Standard query 0xbbe4 A ocsp.digicert.com |
542 | 42.164116 | 8.8.8.8 | 10.10.0.33 | DNS | 125 | Standard query response 0xbbe4 A ocsp.digicert.com CNAME cs9.wac.phicdn.net A 93.184.220.29 |
543 | 42.165486 | 10.10.0.33 | 93.184.220.29 | TCP | 66 | 53469 > 80 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM |
544 | 42.166682 | 93.184.220.29 | 10.10.0.33 | TCP | 66 | 80 > 53469 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=1460 SACK_PERM WS=512 |
545 | 42.166968 | 10.10.0.33 | 93.184.220.29 | TCP | 60 | 53469 > 80 [ACK] Seq=1 Ack=1 Win=65536 Len=0 |
546 | 42.167163 | 10.10.0.33 | 93.184.220.29 | HTTP | 290 | GET /MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D HTTP/1.1 |
547 | 42.168309 | 93.184.220.29 | 10.10.0.33 | TCP | 54 | 80 > 53469 [ACK] Seq=1 Ack=237 Win=67072 Len=0 |
548 | 42.168725 | 93.184.220.29 | 10.10.0.33 | OCSP | 853 | Response |
549 | 42.191064 | 10.10.0.33 | 72.21.81.200 | TLSv1.2 | 180 | Client Key Exchange, Change Cipher Spec, Encrypted Handshake Message |
550 | 42.191416 | 10.10.0.33 | 72.21.81.200 | TLSv1.2 | 294 | Application Data |
551 | 42.213172 | 10.10.0.33 | 93.184.220.29 | TCP | 60 | 53469 > 80 [ACK] Seq=237 Ack=800 Win=64768 Len=0 |
552 | 42.26116 | 72.21.81.200 | 10.10.0.33 | TCP | 54 | 443 > 53467 [ACK] Seq=7176 Ack=320 Win=67072 Len=0 |
553 | 42.261351 | 72.21.81.200 | 10.10.0.33 | TLSv1.2 | 280 | New Session Ticket, Change Cipher Spec, Encrypted Handshake Message |
554 | 42.261451 | 72.21.81.200 | 10.10.0.33 | TCP | 54 | 443 > 53467 [ACK] Seq=7402 Ack=560 Win=68096 Len=0 |
555 | 42.261558 | 10.10.0.33 | 72.21.81.200 | TCP | 60 | 53467 > 443 [ACK] Seq=560 Ack=7402 Win=261752 Len=0 |
556 | 42.264339 | 72.21.81.200 | 10.10.0.33 | TLSv1.2 | 1,514 | Application Data |
557 | 42.264343 | 72.21.81.200 | 10.10.0.33 | TCP | 1,514 | 443 > 53467 [PSH, ACK] Seq=8862 Ack=560 Win=68096 Len=1460 [TCP PDU reassembled in 567] |
558 | 42.264351 | 72.21.81.200 | 10.10.0.33 | TCP | 1,514 | 443 > 53467 [ACK] Seq=10322 Ack=560 Win=68096 Len=1460 [TCP PDU reassembled in 567] |
559 | 42.264352 | 72.21.81.200 | 10.10.0.33 | TCP | 1,514 | 443 > 53467 [PSH, ACK] Seq=11782 Ack=560 Win=68096 Len=1460 [TCP PDU reassembled in 567] |
560 | 42.264357 | 72.21.81.200 | 10.10.0.33 | TCP | 1,514 | 443 > 53467 [ACK] Seq=13242 Ack=560 Win=68096 Len=1460 [TCP PDU reassembled in 567] |
561 | 42.264392 | 72.21.81.200 | 10.10.0.33 | TCP | 1,514 | 443 > 53467 [PSH, ACK] Seq=14702 Ack=560 Win=68096 Len=1460 [TCP PDU reassembled in 567] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.