No.
int64 1
117k
| Time
float64 0
6.94k
| Source
stringclasses 322
values | Destination
stringclasses 539
values | Protocol
stringclasses 59
values | Length
int64 42
6.05k
| Info
stringlengths 1
654
|
---|---|---|---|---|---|---|
562 | 42.264399 | 72.21.81.200 | 10.10.0.33 | TCP | 1,514 | 443 > 53467 [ACK] Seq=16162 Ack=560 Win=68096 Len=1460 [TCP PDU reassembled in 567] |
563 | 42.2644 | 72.21.81.200 | 10.10.0.33 | TCP | 1,514 | 443 > 53467 [PSH, ACK] Seq=17622 Ack=560 Win=68096 Len=1460 [TCP PDU reassembled in 567] |
564 | 42.264407 | 72.21.81.200 | 10.10.0.33 | TCP | 1,514 | 443 > 53467 [ACK] Seq=19082 Ack=560 Win=68096 Len=1460 [TCP PDU reassembled in 567] |
565 | 42.264408 | 72.21.81.200 | 10.10.0.33 | TCP | 1,514 | 443 > 53467 [PSH, ACK] Seq=20542 Ack=560 Win=68096 Len=1460 [TCP PDU reassembled in 567] |
566 | 42.264424 | 72.21.81.200 | 10.10.0.33 | TCP | 1,514 | 443 > 53467 [ACK] Seq=22002 Ack=560 Win=68096 Len=1460 [TCP PDU reassembled in 567] |
567 | 42.264425 | 72.21.81.200 | 10.10.0.33 | TLSv1.2 | 781 | Application Data |
568 | 42.264593 | 10.10.0.33 | 72.21.81.200 | TCP | 60 | 53467 > 443 [ACK] Seq=560 Ack=8862 Win=262144 Len=0 |
569 | 42.264719 | 10.10.0.33 | 72.21.81.200 | TCP | 60 | 53467 > 443 [ACK] Seq=560 Ack=10322 Win=262144 Len=0 |
570 | 42.264833 | 10.10.0.33 | 72.21.81.200 | TCP | 60 | 53467 > 443 [ACK] Seq=560 Ack=11782 Win=262144 Len=0 |
571 | 42.264934 | 10.10.0.33 | 72.21.81.200 | TCP | 60 | 53467 > 443 [ACK] Seq=560 Ack=13242 Win=262144 Len=0 |
572 | 42.265731 | 10.10.0.33 | 72.21.81.200 | TCP | 60 | 53467 > 443 [ACK] Seq=560 Ack=14702 Win=262144 Len=0 |
573 | 42.265763 | 10.10.0.33 | 72.21.81.200 | TCP | 60 | 53467 > 443 [ACK] Seq=560 Ack=16162 Win=262144 Len=0 |
574 | 42.26579 | 10.10.0.33 | 72.21.81.200 | TCP | 60 | 53467 > 443 [ACK] Seq=560 Ack=17622 Win=262144 Len=0 |
575 | 42.265817 | 10.10.0.33 | 72.21.81.200 | TCP | 60 | 53467 > 443 [ACK] Seq=560 Ack=19082 Win=262144 Len=0 |
576 | 42.265881 | 10.10.0.33 | 72.21.81.200 | TCP | 60 | 53467 > 443 [ACK] Seq=560 Ack=20542 Win=262144 Len=0 |
577 | 42.265907 | 10.10.0.33 | 72.21.81.200 | TCP | 60 | 53467 > 443 [ACK] Seq=560 Ack=22002 Win=262144 Len=0 |
578 | 42.265944 | 10.10.0.33 | 72.21.81.200 | TCP | 60 | 53467 > 443 [ACK] Seq=560 Ack=23462 Win=262144 Len=0 |
579 | 42.26597 | 10.10.0.33 | 72.21.81.200 | TCP | 60 | 53467 > 443 [ACK] Seq=560 Ack=24189 Win=261416 Len=0 |
580 | 45.599265 | 10.10.0.33 | 72.21.81.200 | TCP | 66 | 53470 > 443 [SYN] Seq=0 Win=65535 Len=0 MSS=1460 WS=8 SACK_PERM |
581 | 45.669168 | 72.21.81.200 | 10.10.0.33 | TCP | 66 | 443 > 53470 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=1460 SACK_PERM WS=512 |
582 | 45.669456 | 10.10.0.33 | 72.21.81.200 | TCP | 60 | 53470 > 443 [ACK] Seq=1 Ack=1 Win=262144 Len=0 |
583 | 45.691021 | 10.10.0.33 | 72.21.81.200 | TLSv1.2 | 247 | Client Hello (SNI=iecvlist.microsoft.com) |
584 | 45.760925 | 72.21.81.200 | 10.10.0.33 | TCP | 54 | 443 > 53470 [ACK] Seq=1 Ack=194 Win=67072 Len=0 |
585 | 45.761089 | 72.21.81.200 | 10.10.0.33 | TLSv1.2 | 1,514 | Server Hello |
586 | 45.761093 | 72.21.81.200 | 10.10.0.33 | TCP | 1,514 | 443 > 53470 [PSH, ACK] Seq=1461 Ack=194 Win=67072 Len=1460 [TCP PDU reassembled in 592] |
587 | 45.7611 | 72.21.81.200 | 10.10.0.33 | TCP | 1,230 | 443 > 53470 [PSH, ACK] Seq=2921 Ack=194 Win=67072 Len=1176 [TCP PDU reassembled in 592] |
588 | 45.761293 | 10.10.0.33 | 72.21.81.200 | TCP | 60 | 53470 > 443 [ACK] Seq=194 Ack=1461 Win=262144 Len=0 |
589 | 45.761422 | 10.10.0.33 | 72.21.81.200 | TCP | 60 | 53470 > 443 [ACK] Seq=194 Ack=2921 Win=262144 Len=0 |
590 | 45.761524 | 10.10.0.33 | 72.21.81.200 | TCP | 60 | 53470 > 443 [ACK] Seq=194 Ack=4097 Win=260968 Len=0 |
591 | 45.761996 | 72.21.81.200 | 10.10.0.33 | TCP | 1,514 | 443 > 53470 [ACK] Seq=4097 Ack=194 Win=67072 Len=1460 [TCP PDU reassembled in 592] |
592 | 45.761999 | 72.21.81.200 | 10.10.0.33 | TLSv1.2 | 1,514 | Certificate, Certificate Status |
593 | 45.762004 | 72.21.81.200 | 10.10.0.33 | TLSv1.2 | 213 | Server Key Exchange, Server Hello Done |
594 | 45.762135 | 10.10.0.33 | 72.21.81.200 | TCP | 60 | 53470 > 443 [ACK] Seq=194 Ack=5557 Win=262144 Len=0 |
595 | 45.762239 | 10.10.0.33 | 72.21.81.200 | TCP | 60 | 53470 > 443 [ACK] Seq=194 Ack=7017 Win=262144 Len=0 |
596 | 45.76234 | 10.10.0.33 | 72.21.81.200 | TCP | 60 | 53470 > 443 [ACK] Seq=194 Ack=7176 Win=261984 Len=0 |
597 | 45.901723 | 10.10.0.33 | 72.21.81.200 | TLSv1.2 | 180 | Client Key Exchange, Change Cipher Spec, Encrypted Handshake Message |
598 | 45.90209 | 10.10.0.33 | 72.21.81.200 | TLSv1.2 | 344 | Application Data |
599 | 45.971607 | 72.21.81.200 | 10.10.0.33 | TCP | 54 | 443 > 53470 [ACK] Seq=7176 Ack=320 Win=67072 Len=0 |
600 | 45.971836 | 72.21.81.200 | 10.10.0.33 | TLSv1.2 | 280 | New Session Ticket, Change Cipher Spec, Encrypted Handshake Message |
601 | 45.971926 | 72.21.81.200 | 10.10.0.33 | TCP | 54 | 443 > 53470 [ACK] Seq=7402 Ack=610 Win=68096 Len=0 |
602 | 45.972184 | 10.10.0.33 | 72.21.81.200 | TCP | 60 | 53470 > 443 [ACK] Seq=610 Ack=7402 Win=261752 Len=0 |
603 | 45.972542 | 72.21.81.200 | 10.10.0.33 | TLSv1.2 | 458 | Application Data |
604 | 45.972726 | 10.10.0.33 | 72.21.81.200 | TCP | 60 | 53470 > 443 [ACK] Seq=610 Ack=7806 Win=261352 Len=0 |
605 | 47.839724 | 10.10.0.33 | 13.107.5.80 | TCP | 66 | 53474 > 80 [SYN] Seq=0 Win=65535 Len=0 MSS=1460 WS=8 SACK_PERM |
606 | 47.839831 | 10.10.0.33 | 13.107.5.80 | TCP | 66 | 53473 > 80 [SYN] Seq=0 Win=65535 Len=0 MSS=1460 WS=8 SACK_PERM |
607 | 47.841643 | 13.107.5.80 | 10.10.0.33 | TCP | 66 | 80 > 53474 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=1440 WS=256 SACK_PERM |
608 | 47.841653 | 13.107.5.80 | 10.10.0.33 | TCP | 66 | 80 > 53473 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=1440 WS=256 SACK_PERM |
609 | 47.841889 | 10.10.0.33 | 13.107.5.80 | TCP | 60 | 53474 > 80 [ACK] Seq=1 Ack=1 Win=262144 Len=0 |
610 | 47.842033 | 10.10.0.33 | 13.107.5.80 | TCP | 60 | 53473 > 80 [ACK] Seq=1 Ack=1 Win=262144 Len=0 |
611 | 47.842256 | 10.10.0.33 | 13.107.5.80 | HTTP | 387 | GET /qsml.aspx?query=http%3A%2F%2F18.184.26.60%2Fwww%2F&maxwidth=543&rowheight=20§ionHeight=160&FORM=IESS02&market=en-US HTTP/1.1 |
612 | 47.843927 | 13.107.5.80 | 10.10.0.33 | TCP | 54 | 80 > 53473 [ACK] Seq=1 Ack=334 Win=4204800 Len=0 |
613 | 47.890693 | 13.107.5.80 | 10.10.0.33 | TCP | 1,514 | 80 > 53473 [ACK] Seq=1 Ack=334 Win=4204800 Len=1460 [TCP PDU reassembled in 614] |
614 | 47.890703 | 13.107.5.80 | 10.10.0.33 | HTTP/XML | 163 | HTTP/1.1 200 OK |
615 | 47.890994 | 10.10.0.33 | 13.107.5.80 | TCP | 60 | 53473 > 80 [ACK] Seq=334 Ack=1461 Win=262144 Len=0 |
616 | 47.891129 | 10.10.0.33 | 13.107.5.80 | TCP | 60 | 53473 > 80 [ACK] Seq=334 Ack=1570 Win=262032 Len=0 |
617 | 48.649496 | 10.10.0.33 | 18.184.26.60 | TCP | 66 | 53475 > 80 [SYN] Seq=0 Win=65535 Len=0 MSS=1460 WS=8 SACK_PERM |
618 | 48.649757 | 10.10.0.33 | 18.184.26.60 | TCP | 66 | 53476 > 80 [SYN] Seq=0 Win=65535 Len=0 MSS=1460 WS=8 SACK_PERM |
619 | 48.657909 | 18.184.26.60 | 10.10.0.33 | TCP | 66 | 80 > 53475 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=1460 WS=256 SACK_PERM |
620 | 48.658102 | 10.10.0.33 | 18.184.26.60 | TCP | 60 | 53475 > 80 [ACK] Seq=1 Ack=1 Win=262144 Len=0 |
621 | 48.658256 | 18.184.26.60 | 10.10.0.33 | TCP | 66 | 80 > 53476 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=1460 WS=256 SACK_PERM |
622 | 48.658392 | 10.10.0.33 | 18.184.26.60 | TCP | 60 | 53476 > 80 [ACK] Seq=1 Ack=1 Win=262144 Len=0 |
623 | 48.65844 | 10.10.0.33 | 18.184.26.60 | HTTP | 317 | GET /www/ HTTP/1.1 |
624 | 48.67195 | 18.184.26.60 | 10.10.0.33 | TCP | 1,514 | 80 > 53475 [ACK] Seq=1 Ack=264 Win=2102272 Len=1460 [TCP PDU reassembled in 625] |
625 | 48.671957 | 18.184.26.60 | 10.10.0.33 | HTTP | 436 | HTTP/1.1 200 OK (text/html) |
626 | 48.672153 | 10.10.0.33 | 18.184.26.60 | TCP | 60 | 53475 > 80 [ACK] Seq=264 Ack=1461 Win=262144 Len=0 |
627 | 48.672267 | 10.10.0.33 | 18.184.26.60 | TCP | 60 | 53475 > 80 [ACK] Seq=264 Ack=1843 Win=261760 Len=0 |
628 | 48.680474 | 10.10.0.33 | 18.184.26.60 | HTTP | 376 | GET /icons/blank.gif HTTP/1.1 |
629 | 48.682908 | 10.10.0.33 | 18.184.26.60 | HTTP | 375 | GET /icons/back.gif HTTP/1.1 |
630 | 48.683413 | 10.10.0.33 | 18.184.26.60 | TCP | 66 | 53477 > 80 [SYN] Seq=0 Win=65535 Len=0 MSS=1460 WS=8 SACK_PERM |
631 | 48.692953 | 18.184.26.60 | 10.10.0.33 | TCP | 66 | 80 > 53477 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=1460 WS=256 SACK_PERM |
632 | 48.69317 | 10.10.0.33 | 18.184.26.60 | TCP | 60 | 53477 > 80 [ACK] Seq=1 Ack=1 Win=262144 Len=0 |
633 | 48.693306 | 10.10.0.33 | 18.184.26.60 | HTTP | 377 | GET /icons/binary.gif HTTP/1.1 |
634 | 48.693486 | 18.184.26.60 | 10.10.0.33 | HTTP | 509 | HTTP/1.1 200 OK (GIF89a) |
635 | 48.693721 | 10.10.0.33 | 18.184.26.60 | TCP | 60 | 53475 > 80 [ACK] Seq=586 Ack=2298 Win=261304 Len=0 |
636 | 48.694058 | 18.184.26.60 | 10.10.0.33 | HTTP | 578 | HTTP/1.1 200 OK (GIF89a) |
637 | 48.694217 | 10.10.0.33 | 18.184.26.60 | TCP | 60 | 53476 > 80 [ACK] Seq=322 Ack=525 Win=261616 Len=0 |
638 | 48.702386 | 18.184.26.60 | 10.10.0.33 | HTTP | 608 | HTTP/1.1 200 OK (GIF89a) |
639 | 48.70257 | 10.10.0.33 | 18.184.26.60 | TCP | 60 | 53477 > 80 [ACK] Seq=324 Ack=555 Win=261584 Len=0 |
640 | 49.086502 | 10.10.0.33 | 18.184.26.60 | TCP | 66 | 53478 > 80 [SYN] Seq=0 Win=65535 Len=0 MSS=1460 WS=8 SACK_PERM |
641 | 49.086783 | 10.10.0.33 | 18.184.26.60 | TCP | 66 | 53479 > 80 [SYN] Seq=0 Win=65535 Len=0 MSS=1460 WS=8 SACK_PERM |
642 | 49.097966 | 18.184.26.60 | 10.10.0.33 | TCP | 66 | 80 > 53479 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=1460 WS=256 SACK_PERM |
643 | 49.098128 | 18.184.26.60 | 10.10.0.33 | TCP | 66 | 80 > 53478 [SYN, ACK] Seq=0 Ack=1 Win=65535 Len=0 MSS=1460 WS=256 SACK_PERM |
644 | 49.098193 | 10.10.0.33 | 18.184.26.60 | TCP | 60 | 53479 > 80 [ACK] Seq=1 Ack=1 Win=262144 Len=0 |
645 | 49.098344 | 10.10.0.33 | 18.184.26.60 | TCP | 60 | 53478 > 80 [ACK] Seq=1 Ack=1 Win=262144 Len=0 |
646 | 49.099017 | 10.10.0.33 | 18.184.26.60 | HTTP | 275 | GET /favicon.ico HTTP/1.1 |
647 | 49.108613 | 18.184.26.60 | 10.10.0.33 | TCP | 1,514 | 80 > 53479 [ACK] Seq=1 Ack=222 Win=2102272 Len=1460 [TCP PDU reassembled in 684] |
648 | 49.108616 | 18.184.26.60 | 10.10.0.33 | TCP | 1,514 | 80 > 53479 [ACK] Seq=1461 Ack=222 Win=2102272 Len=1460 [TCP PDU reassembled in 684] |
649 | 49.108617 | 18.184.26.60 | 10.10.0.33 | TCP | 1,514 | 80 > 53479 [ACK] Seq=2921 Ack=222 Win=2102272 Len=1460 [TCP PDU reassembled in 684] |
650 | 49.108619 | 18.184.26.60 | 10.10.0.33 | TCP | 1,514 | 80 > 53479 [ACK] Seq=4381 Ack=222 Win=2102272 Len=1460 [TCP PDU reassembled in 684] |
651 | 49.10862 | 18.184.26.60 | 10.10.0.33 | TCP | 1,514 | 80 > 53479 [ACK] Seq=5841 Ack=222 Win=2102272 Len=1460 [TCP PDU reassembled in 684] |
652 | 49.10866 | 18.184.26.60 | 10.10.0.33 | TCP | 1,514 | 80 > 53479 [ACK] Seq=7301 Ack=222 Win=2102272 Len=1460 [TCP PDU reassembled in 684] |
653 | 49.108661 | 18.184.26.60 | 10.10.0.33 | TCP | 1,514 | 80 > 53479 [ACK] Seq=8761 Ack=222 Win=2102272 Len=1460 [TCP PDU reassembled in 684] |
654 | 49.108662 | 18.184.26.60 | 10.10.0.33 | TCP | 1,514 | 80 > 53479 [ACK] Seq=10221 Ack=222 Win=2102272 Len=1460 [TCP PDU reassembled in 684] |
655 | 49.108664 | 18.184.26.60 | 10.10.0.33 | TCP | 1,514 | 80 > 53479 [ACK] Seq=11681 Ack=222 Win=2102272 Len=1460 [TCP PDU reassembled in 684] |
656 | 49.108665 | 18.184.26.60 | 10.10.0.33 | TCP | 1,514 | 80 > 53479 [ACK] Seq=13141 Ack=222 Win=2102272 Len=1460 [TCP PDU reassembled in 684] |
657 | 49.108904 | 10.10.0.33 | 18.184.26.60 | TCP | 60 | 53479 > 80 [ACK] Seq=222 Ack=1461 Win=262144 Len=0 |
658 | 49.10904 | 10.10.0.33 | 18.184.26.60 | TCP | 60 | 53479 > 80 [ACK] Seq=222 Ack=2921 Win=262144 Len=0 |
659 | 49.109155 | 10.10.0.33 | 18.184.26.60 | TCP | 60 | 53479 > 80 [ACK] Seq=222 Ack=4381 Win=262144 Len=0 |
660 | 49.109976 | 10.10.0.33 | 18.184.26.60 | TCP | 60 | 53479 > 80 [ACK] Seq=222 Ack=5841 Win=262144 Len=0 |
661 | 49.110007 | 10.10.0.33 | 18.184.26.60 | TCP | 60 | 53479 > 80 [ACK] Seq=222 Ack=7301 Win=262144 Len=0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.