No.
int64 1
117k
| Time
float64 0
6.94k
| Source
stringclasses 322
values | Destination
stringclasses 539
values | Protocol
stringclasses 59
values | Length
int64 42
6.05k
| Info
stringlengths 1
654
|
---|---|---|---|---|---|---|
871 | 70.540933 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49700 > 443 [RST] Seq=696 Win=0 Len=0 |
872 | 70.540951 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49700 > 443 [RST] Seq=696 Win=0 Len=0 |
873 | 70.541258 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49700 [ACK] Seq=35146 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 881] |
874 | 70.541312 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49700 [ACK] Seq=36606 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 881] |
875 | 70.541314 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49700 [ACK] Seq=38066 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 881] |
876 | 70.541316 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49700 [PSH, ACK] Seq=39526 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 881] |
877 | 70.541389 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49700 > 443 [RST] Seq=696 Win=0 Len=0 |
878 | 70.54146 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49700 > 443 [RST] Seq=696 Win=0 Len=0 |
879 | 70.54153 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49700 > 443 [RST] Seq=696 Win=0 Len=0 |
880 | 70.541605 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49700 > 443 [RST] Seq=696 Win=0 Len=0 |
881 | 70.542204 | 2.16.119.157 | 10.0.0.168 | TLSv1.2 | 1,514 | Application Data |
882 | 70.542256 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49700 [ACK] Seq=42446 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 891] |
883 | 70.542258 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49700 [ACK] Seq=43906 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 891] |
884 | 70.54226 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49700 [PSH, ACK] Seq=45366 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 891] |
885 | 70.542333 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49700 > 443 [RST] Seq=696 Win=0 Len=0 |
886 | 70.542414 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49700 > 443 [RST] Seq=696 Win=0 Len=0 |
887 | 70.542496 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49700 > 443 [RST] Seq=696 Win=0 Len=0 |
888 | 70.542566 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49700 > 443 [RST] Seq=696 Win=0 Len=0 |
889 | 70.543146 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49700 [ACK] Seq=46826 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 891] |
890 | 70.5432 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49700 [ACK] Seq=48286 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 891] |
891 | 70.543203 | 2.16.119.157 | 10.0.0.168 | TLSv1.2 | 1,514 | Application Data |
892 | 70.543205 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49700 [PSH, ACK] Seq=51206 Ack=696 Win=64128 Len=1460 |
893 | 70.543282 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49700 > 443 [RST] Seq=696 Win=0 Len=0 |
894 | 70.543367 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49700 > 443 [RST] Seq=696 Win=0 Len=0 |
895 | 70.543436 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49700 > 443 [RST] Seq=696 Win=0 Len=0 |
896 | 70.543507 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49700 > 443 [RST] Seq=696 Win=0 Len=0 |
897 | 71.039234 | 10.0.0.168 | 10.0.0.255 | NBNS | 92 | Name query NB WORKGROUP<1c> |
898 | 71.572442 | 10.0.0.168 | 2.16.119.157 | TCP | 66 | 49701 > 443 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 WS=256 SACK_PERM |
899 | 71.581998 | 2.16.119.157 | 10.0.0.168 | TCP | 66 | 443 > 49701 [SYN, ACK] Seq=0 Ack=1 Win=64240 Len=0 MSS=1460 SACK_PERM WS=128 |
900 | 71.58228 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49701 > 443 [ACK] Seq=1 Ack=1 Win=65536 Len=0 |
901 | 71.5828 | 10.0.0.168 | 2.16.119.157 | TLSv1.2 | 427 | Client Hello (SNI=fs.microsoft.com) |
902 | 71.592309 | 2.16.119.157 | 10.0.0.168 | TCP | 54 | 443 > 49701 [ACK] Seq=1 Ack=374 Win=64128 Len=0 |
903 | 71.592582 | 2.16.119.157 | 10.0.0.168 | TLSv1.2 | 159 | Server Hello, Change Cipher Spec, Encrypted Handshake Message |
904 | 71.593966 | 10.0.0.168 | 2.16.119.157 | TLSv1.2 | 105 | Change Cipher Spec, Encrypted Handshake Message |
905 | 71.595116 | 10.0.0.168 | 2.16.119.157 | TLSv1.2 | 325 | Application Data |
906 | 71.603825 | 2.16.119.157 | 10.0.0.168 | TCP | 54 | 443 > 49701 [ACK] Seq=106 Ack=425 Win=64128 Len=0 |
907 | 71.604789 | 2.16.119.157 | 10.0.0.168 | TCP | 54 | 443 > 49701 [ACK] Seq=106 Ack=696 Win=64128 Len=0 |
908 | 71.605935 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49701 [ACK] Seq=106 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 919] |
909 | 71.605981 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49701 [ACK] Seq=1566 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 919] |
910 | 71.605983 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49701 [ACK] Seq=3026 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 919] |
911 | 71.605984 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49701 [PSH, ACK] Seq=4486 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 919] |
912 | 71.605988 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49701 [ACK] Seq=5946 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 919] |
913 | 71.606029 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49701 [ACK] Seq=7406 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 919] |
914 | 71.606031 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49701 [ACK] Seq=8866 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 919] |
915 | 71.606033 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49701 [PSH, ACK] Seq=10326 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 919] |
916 | 71.606037 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49701 [ACK] Seq=11786 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 919] |
917 | 71.606078 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49701 [ACK] Seq=13246 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 919] |
918 | 71.606079 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49701 [ACK] Seq=14706 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 919] |
919 | 71.606081 | 2.16.119.157 | 10.0.0.168 | TLSv1.2 | 1,514 | Application Data |
920 | 71.606084 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49701 [ACK] Seq=17626 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 935] |
921 | 71.606128 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49701 [ACK] Seq=19086 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 935] |
922 | 71.60613 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49701 [ACK] Seq=20546 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 935] |
923 | 71.606132 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49701 [PSH, ACK] Seq=22006 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 935] |
924 | 71.606307 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49701 > 443 [ACK] Seq=696 Ack=3026 Win=65536 Len=0 |
925 | 71.606565 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49701 > 443 [ACK] Seq=696 Ack=5946 Win=65536 Len=0 |
926 | 71.606763 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49701 > 443 [ACK] Seq=696 Ack=7406 Win=65536 Len=0 |
927 | 71.606866 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49701 > 443 [ACK] Seq=696 Ack=8866 Win=65536 Len=0 |
928 | 71.60779 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49701 > 443 [ACK] Seq=696 Ack=11786 Win=65536 Len=0 |
929 | 71.607831 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49701 > 443 [ACK] Seq=696 Ack=14706 Win=65536 Len=0 |
930 | 71.607859 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49701 > 443 [ACK] Seq=696 Ack=17626 Win=65536 Len=0 |
931 | 71.607895 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49701 > 443 [ACK] Seq=696 Ack=20546 Win=65536 Len=0 |
932 | 71.607971 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49701 > 443 [ACK] Seq=696 Ack=23466 Win=65536 Len=0 |
933 | 71.609954 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49701 > 443 [FIN, ACK] Seq=696 Ack=23466 Win=65536 Len=0 |
934 | 71.615847 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49701 [ACK] Seq=23466 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 935] |
935 | 71.615877 | 2.16.119.157 | 10.0.0.168 | TLSv1.2 | 1,514 | Application Data |
936 | 71.615879 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49701 [ACK] Seq=26386 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 958] |
937 | 71.61588 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49701 [PSH, ACK] Seq=27846 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 958] |
938 | 71.616166 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49701 > 443 [RST, ACK] Seq=697 Ack=24926 Win=0 Len=0 |
939 | 71.616275 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49701 [ACK] Seq=29306 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 958] |
940 | 71.616326 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49701 [ACK] Seq=30766 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 958] |
941 | 71.616328 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49701 [ACK] Seq=32226 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 958] |
942 | 71.616329 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | 443 > 49701 [PSH, ACK] Seq=33686 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 958] |
943 | 71.616414 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49701 > 443 [RST] Seq=696 Win=0 Len=0 |
944 | 71.616529 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49701 > 443 [RST] Seq=696 Win=0 Len=0 |
945 | 71.616632 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49701 > 443 [RST] Seq=696 Win=0 Len=0 |
946 | 71.617109 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49701 > 443 [RST] Seq=696 Win=0 Len=0 |
947 | 71.617145 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49701 > 443 [RST] Seq=696 Win=0 Len=0 |
948 | 71.617176 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49701 > 443 [RST] Seq=696 Win=0 Len=0 |
949 | 71.617185 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | [TCP Spurious Retransmission] 443 > 49701 [ACK] Seq=35146 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 958] |
950 | 71.617231 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49701 > 443 [RST] Seq=696 Win=0 Len=0 |
951 | 71.617232 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | [TCP Spurious Retransmission] 443 > 49701 [ACK] Seq=36606 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 958] |
952 | 71.617236 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | [TCP Spurious Retransmission] 443 > 49701 [ACK] Seq=38066 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 958] |
953 | 71.617237 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | [TCP Spurious Retransmission] 443 > 49701 [PSH, ACK] Seq=39526 Ack=696 Win=64128 Len=1460 [TCP PDU reassembled in 958] |
954 | 71.61771 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49701 > 443 [RST] Seq=696 Win=0 Len=0 |
955 | 71.617742 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49701 > 443 [RST] Seq=696 Win=0 Len=0 |
956 | 71.617771 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49701 > 443 [RST] Seq=696 Win=0 Len=0 |
957 | 71.617806 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49701 > 443 [RST] Seq=696 Win=0 Len=0 |
958 | 71.618099 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | [TCP Spurious Retransmission] 443 > 49701 [ACK] Seq=40986 Ack=696 Win=64128 Len=1460 |
959 | 71.618144 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | [TCP Spurious Retransmission] 443 > 49701 [ACK] Seq=42446 Ack=696 Win=64128 Len=1460 |
960 | 71.618145 | 2.16.119.157 | 10.0.0.168 | TLSv1.2 | 1,514 | [TCP Spurious Retransmission] , Ignored Unknown Record |
961 | 71.618146 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | [TCP Spurious Retransmission] 443 > 49701 [PSH, ACK] Seq=45366 Ack=696 Win=64128 Len=1460 |
962 | 71.618301 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49701 > 443 [RST] Seq=696 Win=0 Len=0 |
963 | 71.618409 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49701 > 443 [RST] Seq=696 Win=0 Len=0 |
964 | 71.618509 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49701 > 443 [RST] Seq=696 Win=0 Len=0 |
965 | 71.618622 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49701 > 443 [RST] Seq=696 Win=0 Len=0 |
966 | 71.619001 | 2.16.119.157 | 10.0.0.168 | TLSv1.2 | 1,514 | [TCP Spurious Retransmission] , Ignored Unknown Record |
967 | 71.61905 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | [TCP Spurious Retransmission] 443 > 49701 [ACK] Seq=48286 Ack=696 Win=64128 Len=1460 |
968 | 71.619052 | 2.16.119.157 | 10.0.0.168 | TLSv1.2 | 1,514 | [TCP Spurious Retransmission] , Ignored Unknown Record |
969 | 71.619054 | 2.16.119.157 | 10.0.0.168 | TCP | 1,514 | [TCP Spurious Retransmission] 443 > 49701 [PSH, ACK] Seq=51206 Ack=696 Win=64128 Len=1460 |
970 | 71.619172 | 10.0.0.168 | 2.16.119.157 | TCP | 60 | 49701 > 443 [RST] Seq=696 Win=0 Len=0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.