No.
int64 1
117k
| Time
float64 0
6.94k
| Source
stringclasses 322
values | Destination
stringclasses 539
values | Protocol
stringclasses 59
values | Length
int64 42
6.05k
| Info
stringlengths 1
654
|
---|---|---|---|---|---|---|
771 | 69.442116 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49692 [ACK] Seq=16223 Ack=1230 Win=64128 Len=1460 [TCP PDU reassembled in 780] |
772 | 69.442125 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49692 [PSH, ACK] Seq=17683 Ack=1230 Win=64128 Len=1460 [TCP PDU reassembled in 780] |
773 | 69.442527 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49692 > 443 [ACK] Seq=1230 Ack=10383 Win=65536 Len=0 |
774 | 69.44273 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49692 [ACK] Seq=19143 Ack=1230 Win=64128 Len=1460 [TCP PDU reassembled in 780] |
775 | 69.442744 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49692 > 443 [ACK] Seq=1230 Ack=13303 Win=65536 Len=0 |
776 | 69.442775 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49692 [PSH, ACK] Seq=20603 Ack=1230 Win=64128 Len=1460 [TCP PDU reassembled in 780] |
777 | 69.442968 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49692 > 443 [ACK] Seq=1230 Ack=16223 Win=65536 Len=0 |
778 | 69.443148 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49692 > 443 [ACK] Seq=1230 Ack=19143 Win=65536 Len=0 |
779 | 69.443425 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49692 [ACK] Seq=22063 Ack=1230 Win=64128 Len=1460 [TCP PDU reassembled in 780] |
780 | 69.443472 | 2.16.119.157 | 10.0.0.168 | TLSv1.2 | 1,514 | Application Data |
781 | 69.443745 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49692 > 443 [ACK] Seq=1230 Ack=22063 Win=65536 Len=0 |
782 | 69.443779 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49692 > 443 [ACK] Seq=1230 Ack=24983 Win=65536 Len=0 |
783 | 69.444716 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49692 > 443 [FIN, ACK] Seq=1230 Ack=24983 Win=65536 Len=0 |
784 | 69.444809 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49692 [ACK] Seq=24983 Ack=1230 Win=64128 Len=1460 [TCP PDU reassembled in 793] |
785 | 69.444852 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49692 [PSH, ACK] Seq=26443 Ack=1230 Win=64128 Len=1460 [TCP PDU reassembled in 793] |
786 | 69.444911 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49692 [ACK] Seq=27903 Ack=1230 Win=64128 Len=1460 [TCP PDU reassembled in 793] |
787 | 69.444914 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49692 [PSH, ACK] Seq=29363 Ack=1230 Win=64128 Len=1460 [TCP PDU reassembled in 793] |
788 | 69.444991 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49692 > 443 [RST, ACK] Seq=1231 Ack=26443 Win=0 Len=0 |
789 | 69.445134 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49692 > 443 [RST] Seq=1230 Win=0 Len=0 |
790 | 69.445253 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49692 > 443 [RST] Seq=1230 Win=0 Len=0 |
791 | 69.445355 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49692 > 443 [RST] Seq=1230 Win=0 Len=0 |
792 | 69.445506 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | [TCP Spurious Retransmission] 443 > 49692 [ACK] Seq=30823 Ack=1230 Win=64128 Len=1460 [TCP PDU reassembled in 793] |
793 | 69.445553 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | [TCP Spurious Retransmission] 443 > 49692 [PSH, ACK] Seq=32283 Ack=1230 Win=64128 Len=1460 |
794 | 69.445663 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49692 > 443 [RST] Seq=1230 Win=0 Len=0 |
795 | 69.445794 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49692 > 443 [RST] Seq=1230 Win=0 Len=0 |
796 | 69.4462 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | [TCP Spurious Retransmission] 443 > 49692 [ACK] Seq=33743 Ack=1230 Win=64128 Len=1460 |
797 | 69.446332 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49692 > 443 [RST] Seq=1230 Win=0 Len=0 |
798 | 69.452223 | 2.16.119.157 | 10.0.0.168 | TLSv1.2 | 1,514 | [TCP Spurious Retransmission] , Ignored Unknown Record |
799 | 69.452261 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | [TCP Spurious Retransmission] 443 > 49692 [PSH, ACK] Seq=36663 Ack=1230 Win=64128 Len=1460 |
800 | 69.452423 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49692 > 443 [RST] Seq=1230 Win=0 Len=0 |
801 | 69.452518 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49692 > 443 [RST] Seq=1230 Win=0 Len=0 |
802 | 69.45256 | 2.16.119.157 | 10.0.0.168 | TLSv1.2 | 1,514 | [TCP Spurious Retransmission] , Ignored Unknown Record |
803 | 69.452606 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | [TCP Spurious Retransmission] 443 > 49692 [PSH, ACK] Seq=39583 Ack=1230 Win=64128 Len=1460 |
804 | 69.452646 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49692 > 443 [RST] Seq=1230 Win=0 Len=0 |
805 | 69.452716 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49692 > 443 [RST] Seq=1230 Win=0 Len=0 |
806 | 69.453247 | 2.16.119.157 | 10.0.0.168 | TLSv1.2 | 1,514 | [TCP Spurious Retransmission] , Ignored Unknown Record |
807 | 69.453296 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | [TCP Spurious Retransmission] 443 > 49692 [PSH, ACK] Seq=42503 Ack=1230 Win=64128 Len=1460 |
808 | 69.453372 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49692 > 443 [RST] Seq=1230 Win=0 Len=0 |
809 | 69.453453 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49692 > 443 [RST] Seq=1230 Win=0 Len=0 |
810 | 69.453938 | 2.16.119.157 | 10.0.0.168 | TLSv1.2 | 1,514 | [TCP Spurious Retransmission] , Ignored Unknown Record |
811 | 69.453986 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | [TCP Spurious Retransmission] 443 > 49692 [PSH, ACK] Seq=45423 Ack=1230 Win=64128 Len=1460 |
812 | 69.454046 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49692 > 443 [RST] Seq=1230 Win=0 Len=0 |
813 | 69.454127 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49692 > 443 [RST] Seq=1230 Win=0 Len=0 |
814 | 69.45464 | 2.16.119.157 | 10.0.0.168 | TLSv1.2 | 1,514 | [TCP Spurious Retransmission] , Ignored Unknown Record |
815 | 69.454689 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | [TCP Spurious Retransmission] 443 > 49692 [PSH, ACK] Seq=48343 Ack=1230 Win=64128 Len=1460 |
816 | 69.454774 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49692 > 443 [RST] Seq=1230 Win=0 Len=0 |
817 | 69.454857 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49692 > 443 [RST] Seq=1230 Win=0 Len=0 |
818 | 69.455327 | 2.16.119.157 | 10.0.0.168 | TLSv1.2 | 1,514 | [TCP Spurious Retransmission] , Ignored Unknown Record |
819 | 69.455378 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | [TCP Spurious Retransmission] 443 > 49692 [PSH, ACK] Seq=51263 Ack=1230 Win=64128 Len=1460 |
820 | 69.455439 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49692 > 443 [RST] Seq=1230 Win=0 Len=0 |
821 | 69.455522 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49692 > 443 [RST] Seq=1230 Win=0 Len=0 |
822 | 70.495073 | 10.0.0.168 | 2.16.119.157 | TCP | 66 | 49700 > 443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM |
823 | 70.505069 | 2.16.119.157 | 10.0.0.168 | TCP | 66 | 443 > 49700 [SYN, ACK] Seq=0 Ack=1 Win=64240 Len=0 MSS=1460 SACK_PERM WS=128 |
824 | 70.505408 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49700 > 443 [ACK] Seq=1 Ack=1 Win=65536 Len=0 |
825 | 70.505893 | 10.0.0.168 | 2.16.119.157 | TLSv1.2 | 427 | Client Hello (SNI=fs.microsoft.com) |
826 | 70.515757 | 2.16.119.157 | 10.0.0.168 | TCP | 54 | 443 > 49700 [ACK] Seq=1 Ack=374 Win=64128 Len=0 |
827 | 70.516073 | 2.16.119.157 | 10.0.0.168 | TLSv1.2 | 159 | Server Hello, Change Cipher Spec, Encrypted Handshake Message |
828 | 70.51709 | 10.0.0.168 | 2.16.119.157 | TLSv1.2 | 105 | Change Cipher Spec, Encrypted Handshake Message |
829 | 70.517525 | 10.0.0.168 | 2.16.119.157 | TLSv1.2 | 325 | Application Data |
830 | 70.526995 | 2.16.119.157 | 10.0.0.168 | TCP | 54 | 443 > 49700 [ACK] Seq=106 Ack=425 Win=64128 Len=0 |
831 | 70.527495 | 2.16.119.157 | 10.0.0.168 | TCP | 54 | 443 > 49700 [ACK] Seq=106 Ack=696 Win=64128 Len=0 |
832 | 70.529484 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49700 [ACK] Seq=106 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 843] |
833 | 70.529495 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49700 [ACK] Seq=1566 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 843] |
834 | 70.529497 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49700 [ACK] Seq=3026 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 843] |
835 | 70.529511 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49700 [PSH, ACK] Seq=4486 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 843] |
836 | 70.529525 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49700 [ACK] Seq=5946 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 843] |
837 | 70.529526 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49700 [ACK] Seq=7406 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 843] |
838 | 70.529528 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49700 [ACK] Seq=8866 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 843] |
839 | 70.529529 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49700 [PSH, ACK] Seq=10326 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 843] |
840 | 70.529541 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49700 [ACK] Seq=11786 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 843] |
841 | 70.529542 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49700 [ACK] Seq=13246 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 843] |
842 | 70.529544 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49700 [ACK] Seq=14706 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 843] |
843 | 70.529563 | 2.16.119.157 | 10.0.0.168 | TLSv1.2 | 1,514 | Application Data |
844 | 70.529568 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49700 [ACK] Seq=17626 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 858] |
845 | 70.529614 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49700 [ACK] Seq=19086 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 858] |
846 | 70.529616 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49700 [ACK] Seq=20546 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 858] |
847 | 70.529617 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49700 [PSH, ACK] Seq=22006 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 858] |
848 | 70.529976 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49700 > 443 [ACK] Seq=696 Ack=3026 Win=65536 Len=0 |
849 | 70.530199 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49700 > 443 [ACK] Seq=696 Ack=5946 Win=65536 Len=0 |
850 | 70.530362 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49700 > 443 [ACK] Seq=696 Ack=8866 Win=65536 Len=0 |
851 | 70.530534 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49700 > 443 [ACK] Seq=696 Ack=11786 Win=65536 Len=0 |
852 | 70.531194 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49700 > 443 [ACK] Seq=696 Ack=14706 Win=65536 Len=0 |
853 | 70.531222 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49700 > 443 [ACK] Seq=696 Ack=17626 Win=65536 Len=0 |
854 | 70.531244 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49700 > 443 [ACK] Seq=696 Ack=20546 Win=65536 Len=0 |
855 | 70.531272 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49700 > 443 [ACK] Seq=696 Ack=23466 Win=65536 Len=0 |
856 | 70.531712 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49700 > 443 [RST, ACK] Seq=696 Ack=23466 Win=0 Len=0 |
857 | 70.539891 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49700 [ACK] Seq=23466 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 858] |
858 | 70.539928 | 2.16.119.157 | 10.0.0.168 | TLSv1.2 | 1,514 | Application Data |
859 | 70.53993 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49700 [ACK] Seq=26386 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 881] |
860 | 70.539932 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49700 [PSH, ACK] Seq=27846 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 881] |
861 | 70.540223 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49700 > 443 [RST] Seq=696 Win=0 Len=0 |
862 | 70.540317 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49700 [ACK] Seq=29306 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 881] |
863 | 70.540365 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49700 [ACK] Seq=30766 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 881] |
864 | 70.540367 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49700 [ACK] Seq=32226 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 881] |
865 | 70.540369 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49700 [PSH, ACK] Seq=33686 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 881] |
866 | 70.540433 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49700 > 443 [RST] Seq=696 Win=0 Len=0 |
867 | 70.540512 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49700 > 443 [RST] Seq=696 Win=0 Len=0 |
868 | 70.540582 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49700 > 443 [RST] Seq=696 Win=0 Len=0 |
869 | 70.540892 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49700 > 443 [RST] Seq=696 Win=0 Len=0 |
870 | 70.540914 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49700 > 443 [RST] Seq=696 Win=0 Len=0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.