No.
int64 1
117k
| Time
float64 0
6.94k
| Source
stringclasses 322
values | Destination
stringclasses 539
values | Protocol
stringclasses 59
values | Length
int64 42
6.05k
| Info
stringlengths 1
654
|
---|---|---|---|---|---|---|
671 | 67.363339 | 10.0.0.168 | 204.79.197.200 | TCP | 60 | 49694 > 443 [ACK] Seq=1049 Ack=198343 Win=262144 Len=0 |
672 | 67.363371 | 10.0.0.168 | 204.79.197.200 | TCP | 60 | 49694 > 443 [ACK] Seq=1049 Ack=199803 Win=262144 Len=0 |
673 | 67.363403 | 10.0.0.168 | 204.79.197.200 | TCP | 60 | 49694 > 443 [ACK] Seq=1049 Ack=200168 Win=261776 Len=0 |
674 | 67.363435 | 10.0.0.168 | 204.79.197.200 | TCP | 60 | 49694 > 443 [ACK] Seq=1049 Ack=201628 Win=262144 Len=0 |
675 | 67.363561 | 10.0.0.168 | 204.79.197.200 | TCP | 60 | 49694 > 443 [ACK] Seq=1049 Ack=203088 Win=262144 Len=0 |
676 | 67.363592 | 10.0.0.168 | 204.79.197.200 | TCP | 60 | 49694 > 443 [ACK] Seq=1049 Ack=204548 Win=262144 Len=0 |
677 | 67.363625 | 10.0.0.168 | 204.79.197.200 | TCP | 60 | 49694 > 443 [ACK] Seq=1049 Ack=206008 Win=262144 Len=0 |
678 | 67.363656 | 10.0.0.168 | 204.79.197.200 | TCP | 60 | 49694 > 443 [ACK] Seq=1049 Ack=207468 Win=262144 Len=0 |
679 | 67.36378 | 10.0.0.168 | 204.79.197.200 | TCP | 60 | 49694 > 443 [ACK] Seq=1049 Ack=208928 Win=262144 Len=0 |
680 | 67.363811 | 10.0.0.168 | 204.79.197.200 | TCP | 60 | 49694 > 443 [ACK] Seq=1049 Ack=210388 Win=262144 Len=0 |
681 | 67.363844 | 10.0.0.168 | 204.79.197.200 | TCP | 60 | 49694 > 443 [ACK] Seq=1049 Ack=211848 Win=262144 Len=0 |
682 | 67.363875 | 10.0.0.168 | 204.79.197.200 | TCP | 60 | 49694 > 443 [ACK] Seq=1049 Ack=212906 Win=261080 Len=0 |
683 | 67.363998 | 10.0.0.168 | 204.79.197.200 | TCP | 60 | 49694 > 443 [ACK] Seq=1049 Ack=214366 Win=262144 Len=0 |
684 | 67.364041 | 10.0.0.168 | 204.79.197.200 | TCP | 60 | 49694 > 443 [ACK] Seq=1049 Ack=215826 Win=262144 Len=0 |
685 | 67.36407 | 10.0.0.168 | 204.79.197.200 | TCP | 60 | 49694 > 443 [ACK] Seq=1049 Ack=216535 Win=261432 Len=0 |
686 | 67.364095 | 10.0.0.168 | 204.79.197.200 | TCP | 60 | 49694 > 443 [ACK] Seq=1049 Ack=217995 Win=262144 Len=0 |
687 | 67.364173 | 10.0.0.168 | 204.79.197.200 | TCP | 60 | 49694 > 443 [ACK] Seq=1049 Ack=219455 Win=262144 Len=0 |
688 | 67.364194 | 10.0.0.168 | 204.79.197.200 | TCP | 60 | 49694 > 443 [ACK] Seq=1049 Ack=220915 Win=262144 Len=0 |
689 | 67.364218 | 10.0.0.168 | 204.79.197.200 | TCP | 60 | 49694 > 443 [ACK] Seq=1049 Ack=222375 Win=262144 Len=0 |
690 | 67.36424 | 10.0.0.168 | 204.79.197.200 | TCP | 60 | 49694 > 443 [ACK] Seq=1049 Ack=223835 Win=262144 Len=0 |
691 | 67.364295 | 10.0.0.168 | 204.79.197.200 | TCP | 60 | 49694 > 443 [ACK] Seq=1049 Ack=225295 Win=262144 Len=0 |
692 | 67.364316 | 10.0.0.168 | 204.79.197.200 | TCP | 60 | 49694 > 443 [ACK] Seq=1049 Ack=226755 Win=262144 Len=0 |
693 | 67.364339 | 10.0.0.168 | 204.79.197.200 | TCP | 60 | 49694 > 443 [ACK] Seq=1049 Ack=228215 Win=262144 Len=0 |
694 | 67.364361 | 10.0.0.168 | 204.79.197.200 | TCP | 60 | 49694 > 443 [ACK] Seq=1049 Ack=229205 Win=261152 Len=0 |
695 | 67.364415 | 10.0.0.168 | 204.79.197.200 | TCP | 60 | 49694 > 443 [ACK] Seq=1049 Ack=230511 Win=262144 Len=0 |
696 | 67.762495 | 10.0.0.168 | 8.8.8.8 | DNS | 76 | Standard query 0x2314 A go.microsoft.com |
697 | 67.764222 | 8.8.8.8 | 10.0.0.168 | DNS | 171 | Standard query response 0x2314 A go.microsoft.com CNAME go.microsoft.com.edgekey.net CNAME e11290.dspg.akamaiedge.net A 23.62.131.230 |
698 | 67.764976 | 10.0.0.168 | 23.62.131.230 | TCP | 66 | 49697 > 443 [SYN] Seq=0 Win=65535 Len=0 MSS=1460 WS=8 SACK_PERM |
699 | 67.765759 | 10.0.0.168 | 23.62.131.230 | TCP | 66 | 49698 > 443 [SYN] Seq=0 Win=65535 Len=0 MSS=1460 WS=8 SACK_PERM |
700 | 67.766389 | 23.62.131.230 | 10.0.0.168 | TCP | 66 | 443 > 49697 [SYN, ACK] Seq=0 Ack=1 Win=64240 Len=0 MSS=1460 SACK_PERM WS=128 |
701 | 67.766571 | 10.0.0.168 | 23.62.131.230 | TCP | 60 | 49697 > 443 [ACK] Seq=1 Ack=1 Win=262144 Len=0 |
702 | 67.766957 | 10.0.0.168 | 23.62.131.230 | TLSv1.2 | 259 | Client Hello (SNI=go.microsoft.com) |
703 | 67.767164 | 23.62.131.230 | 10.0.0.168 | TCP | 66 | 443 > 49698 [SYN, ACK] Seq=0 Ack=1 Win=64240 Len=0 MSS=1460 SACK_PERM WS=128 |
704 | 67.767319 | 10.0.0.168 | 23.62.131.230 | TCP | 60 | 49698 > 443 [ACK] Seq=1 Ack=1 Win=262144 Len=0 |
705 | 67.767597 | 10.0.0.168 | 23.62.131.230 | TLSv1.2 | 259 | Client Hello (SNI=go.microsoft.com) |
706 | 67.768249 | 23.62.131.230 | 10.0.0.168 | TCP | 54 | 443 > 49697 [ACK] Seq=1 Ack=206 Win=64128 Len=0 |
707 | 67.768684 | 23.62.131.230 | 10.0.0.168 | TLSv1.2 | 1,514 | Server Hello |
708 | 67.768734 | 23.62.131.230 | 10.0.0.168 | TCP | 1,514 | 443 > 49697 [PSH, ACK] Seq=1461 Ack=206 Win=64128 Len=1460 [TCP PDU reassembled in 709] |
709 | 67.76874 | 23.62.131.230 | 10.0.0.168 | TLSv1.2 | 1,230 | Certificate |
710 | 67.768911 | 10.0.0.168 | 23.62.131.230 | TCP | 60 | 49697 > 443 [ACK] Seq=206 Ack=1461 Win=262144 Len=0 |
711 | 67.769019 | 23.62.131.230 | 10.0.0.168 | TCP | 54 | 443 > 49698 [ACK] Seq=1 Ack=206 Win=64128 Len=0 |
712 | 67.769087 | 10.0.0.168 | 23.62.131.230 | TCP | 60 | 49697 > 443 [ACK] Seq=206 Ack=2921 Win=262144 Len=0 |
713 | 67.769235 | 10.0.0.168 | 23.62.131.230 | TCP | 60 | 49697 > 443 [ACK] Seq=206 Ack=4097 Win=260968 Len=0 |
714 | 67.769322 | 23.62.131.230 | 10.0.0.168 | TLSv1.2 | 1,514 | Server Hello |
715 | 67.76937 | 23.62.131.230 | 10.0.0.168 | TCP | 1,514 | 443 > 49698 [PSH, ACK] Seq=1461 Ack=206 Win=64128 Len=1460 [TCP PDU reassembled in 716] |
716 | 67.769377 | 23.62.131.230 | 10.0.0.168 | TLSv1.2 | 1,230 | Certificate |
717 | 67.769557 | 10.0.0.168 | 23.62.131.230 | TCP | 60 | 49698 > 443 [ACK] Seq=206 Ack=1461 Win=262144 Len=0 |
718 | 67.769852 | 10.0.0.168 | 23.62.131.230 | TCP | 60 | 49698 > 443 [ACK] Seq=206 Ack=2921 Win=262144 Len=0 |
719 | 67.769869 | 10.0.0.168 | 23.62.131.230 | TCP | 60 | 49698 > 443 [ACK] Seq=206 Ack=4097 Win=260968 Len=0 |
720 | 67.77046 | 23.62.131.230 | 10.0.0.168 | TLSv1.2 | 1,514 | Certificate Status |
721 | 67.770513 | 23.62.131.230 | 10.0.0.168 | TLSv1.2 | 188 | Server Key Exchange, Server Hello Done |
722 | 67.770595 | 10.0.0.168 | 23.62.131.230 | TCP | 60 | 49697 > 443 [ACK] Seq=206 Ack=5557 Win=262144 Len=0 |
723 | 67.770674 | 10.0.0.168 | 23.62.131.230 | TCP | 60 | 49697 > 443 [ACK] Seq=206 Ack=5691 Win=262008 Len=0 |
724 | 67.771816 | 23.62.131.230 | 10.0.0.168 | TLSv1.2 | 1,514 | Certificate Status |
725 | 67.771868 | 23.62.131.230 | 10.0.0.168 | TLSv1.2 | 188 | Server Key Exchange, Server Hello Done |
726 | 67.77198 | 10.0.0.168 | 23.62.131.230 | TCP | 60 | 49698 > 443 [ACK] Seq=206 Ack=5557 Win=262144 Len=0 |
727 | 67.772068 | 10.0.0.168 | 23.62.131.230 | TCP | 60 | 49698 > 443 [ACK] Seq=206 Ack=5691 Win=262008 Len=0 |
728 | 67.790723 | 10.0.0.168 | 93.184.220.29 | HTTP | 290 | GET /MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8Ull8gIGmZT9XHrHiJQeI%3D HTTP/1.1 |
729 | 67.7919 | 93.184.220.29 | 10.0.0.168 | TCP | 54 | 80 > 49686 [ACK] Seq=2636 Ack=715 Win=69120 Len=0 |
730 | 67.792402 | 93.184.220.29 | 10.0.0.168 | TCP | 1,514 | 80 > 49686 [ACK] Seq=2636 Ack=715 Win=69120 Len=1460 [TCP PDU reassembled in 731] |
731 | 67.792445 | 93.184.220.29 | 10.0.0.168 | OCSP | 430 | Response |
732 | 67.79262 | 10.0.0.168 | 93.184.220.29 | TCP | 60 | 49686 > 80 [ACK] Seq=715 Ack=4472 Win=65536 Len=0 |
733 | 67.795361 | 10.0.0.168 | 23.62.131.230 | TLSv1.2 | 180 | Client Key Exchange, Change Cipher Spec, Encrypted Handshake Message |
734 | 67.795524 | 10.0.0.168 | 23.62.131.230 | TLSv1.2 | 180 | Client Key Exchange, Change Cipher Spec, Encrypted Handshake Message |
735 | 67.795621 | 10.0.0.168 | 23.62.131.230 | TLSv1.2 | 597 | Application Data |
736 | 67.796648 | 23.62.131.230 | 10.0.0.168 | TCP | 54 | 443 > 49697 [ACK] Seq=5691 Ack=332 Win=64128 Len=0 |
737 | 67.796919 | 23.62.131.230 | 10.0.0.168 | TCP | 54 | 443 > 49697 [ACK] Seq=5691 Ack=875 Win=64128 Len=0 |
738 | 67.796925 | 23.62.131.230 | 10.0.0.168 | TCP | 54 | 443 > 49698 [ACK] Seq=5691 Ack=332 Win=64128 Len=0 |
739 | 67.800001 | 23.62.131.230 | 10.0.0.168 | TLSv1.2 | 312 | New Session Ticket, Change Cipher Spec, Encrypted Handshake Message |
740 | 67.800206 | 10.0.0.168 | 23.62.131.230 | TCP | 60 | 49697 > 443 [ACK] Seq=875 Ack=5949 Win=261752 Len=0 |
741 | 67.80062 | 23.62.131.230 | 10.0.0.168 | TLSv1.2 | 557 | Application Data |
742 | 67.800755 | 10.0.0.168 | 23.62.131.230 | TCP | 60 | 49697 > 443 [ACK] Seq=875 Ack=6452 Win=261248 Len=0 |
743 | 67.801227 | 23.62.131.230 | 10.0.0.168 | TLSv1.2 | 312 | New Session Ticket, Change Cipher Spec, Encrypted Handshake Message |
744 | 67.801351 | 10.0.0.168 | 23.62.131.230 | TCP | 60 | 49698 > 443 [ACK] Seq=332 Ack=5949 Win=261752 Len=0 |
745 | 67.802163 | 10.0.0.168 | 204.79.197.200 | TLSv1.2 | 374 | Application Data |
746 | 67.80338 | 204.79.197.200 | 10.0.0.168 | TCP | 54 | 443 > 49694 [ACK] Seq=230511 Ack=1369 Win=4203520 Len=0 |
747 | 67.84079 | 204.79.197.200 | 10.0.0.168 | TCP | 1,514 | 443 > 49694 [ACK] Seq=230511 Ack=1369 Win=4203520 Len=1460 [TCP PDU reassembled in 748] |
748 | 67.840828 | 204.79.197.200 | 10.0.0.168 | TLSv1.2 | 372 | Application Data |
749 | 67.840832 | 204.79.197.200 | 10.0.0.168 | TLSv1.2 | 92 | Application Data |
750 | 67.841035 | 10.0.0.168 | 204.79.197.200 | TCP | 60 | 49694 > 443 [ACK] Seq=1369 Ack=231971 Win=262144 Len=0 |
751 | 67.841174 | 10.0.0.168 | 204.79.197.200 | TCP | 60 | 49694 > 443 [ACK] Seq=1369 Ack=232289 Win=261824 Len=0 |
752 | 67.841281 | 10.0.0.168 | 204.79.197.200 | TCP | 60 | 49694 > 443 [ACK] Seq=1369 Ack=232327 Win=261784 Len=0 |
753 | 68.00529 | 10.0.0.168 | 8.8.8.8 | DNS | 77 | Standard query 0x9f5e A www.microsoft.com |
754 | 68.007067 | 8.8.8.8 | 10.0.0.168 | DNS | 244 | Standard query response 0x9f5e A www.microsoft.com CNAME www.microsoft.com-c-3.edgekey.net CNAME www.microsoft.com-c-3.edgekey.net.globalredir.akadns.net CNAME e13678.dscb.akamaiedge.net A 104.85.5.163 |
755 | 68.008696 | 10.0.0.168 | 104.85.5.163 | TCP | 66 | 49699 > 80 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM |
756 | 68.009594 | 104.85.5.163 | 10.0.0.168 | TCP | 66 | 80 > 49699 [SYN, ACK] Seq=0 Ack=1 Win=64240 Len=0 MSS=1460 SACK_PERM WS=128 |
757 | 68.009746 | 10.0.0.168 | 104.85.5.163 | TCP | 60 | 49699 > 80 [ACK] Seq=1 Ack=1 Win=65536 Len=0 |
758 | 68.009914 | 10.0.0.168 | 104.85.5.163 | HTTP | 215 | GET /pkiops/certs/MicSecSerCA2011_2011-10-18.crt HTTP/1.1 |
759 | 68.010771 | 104.85.5.163 | 10.0.0.168 | TCP | 54 | 80 > 49699 [ACK] Seq=1 Ack=162 Win=64128 Len=0 |
760 | 68.028549 | 104.85.5.163 | 10.0.0.168 | TCP | 1,514 | 80 > 49699 [ACK] Seq=1 Ack=162 Win=64128 Len=1460 [TCP PDU reassembled in 761] |
761 | 68.028575 | 104.85.5.163 | 10.0.0.168 | HTTP | 812 | HTTP/1.1 200 OK |
762 | 68.028811 | 10.0.0.168 | 104.85.5.163 | TCP | 60 | 49699 > 80 [ACK] Seq=162 Ack=2219 Win=65536 Len=0 |
763 | 69.322593 | 13.107.42.23 | 10.0.0.168 | TCP | 54 | 443 > 49681 [RST, ACK] Seq=29737 Ack=982 Win=0 Len=0 |
764 | 69.430415 | 10.0.0.168 | 2.16.119.157 | TLSv1.2 | 325 | Application Data |
765 | 69.442072 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49692 [ACK] Seq=7463 Ack=1230 Win=64128 Len=1460 [TCP PDU reassembled in 780] |
766 | 69.442084 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49692 [PSH, ACK] Seq=8923 Ack=1230 Win=64128 Len=1460 [TCP PDU reassembled in 780] |
767 | 69.442097 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49692 [ACK] Seq=10383 Ack=1230 Win=64128 Len=1460 [TCP PDU reassembled in 780] |
768 | 69.442098 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49692 [PSH, ACK] Seq=11843 Ack=1230 Win=64128 Len=1460 [TCP PDU reassembled in 780] |
769 | 69.442107 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49692 [ACK] Seq=13303 Ack=1230 Win=64128 Len=1460 [TCP PDU reassembled in 780] |
770 | 69.442109 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49692 [PSH, ACK] Seq=14763 Ack=1230 Win=64128 Len=1460 [TCP PDU reassembled in 780] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.