No.
int64 1
117k
| Time
float64 0
6.94k
| Source
stringclasses 322
values | Destination
stringclasses 539
values | Protocol
stringclasses 59
values | Length
int64 42
6.05k
| Info
stringlengths 1
654
|
---|---|---|---|---|---|---|
771 | 130.154928 | 172.16.0.111 | 172.16.0.114 | TCP | 54 | 4433 > 6641 [ACK] Seq=93 Ack=282 Win=63959 Len=0 |
772 | 132.12901 | 172.16.0.111 | 172.16.0.114 | TCP | 54 | 4433 > 6641 [FIN, ACK] Seq=93 Ack=282 Win=63959 Len=0 |
773 | 132.129057 | 172.16.0.114 | 172.16.0.111 | TCP | 54 | 6641 > 4433 [ACK] Seq=282 Ack=94 Win=64148 Len=0 |
774 | 132.129275 | 172.16.0.111 | 172.16.0.114 | TCP | 54 | 4433 > 6642 [FIN, ACK] Seq=15 Ack=8 Win=64233 Len=0 |
775 | 132.129303 | 172.16.0.114 | 172.16.0.111 | TCP | 54 | 6642 > 4433 [ACK] Seq=8 Ack=16 Win=64224 Len=0 |
776 | 132.129523 | 172.16.0.114 | 172.16.0.111 | TCP | 54 | 6641 > 4433 [FIN, ACK] Seq=282 Ack=94 Win=64148 Len=0 |
777 | 132.129609 | 172.16.0.111 | 172.16.0.114 | TCP | 54 | 4433 > 6641 [ACK] Seq=94 Ack=283 Win=63959 Len=0 |
778 | 132.129785 | 172.16.0.114 | 172.16.0.111 | TCP | 54 | 6642 > 4433 [FIN, ACK] Seq=8 Ack=16 Win=64224 Len=0 |
779 | 132.129847 | 172.16.0.111 | 172.16.0.114 | TCP | 54 | 4433 > 6642 [ACK] Seq=16 Ack=9 Win=64233 Len=0 |
1 | 0 | 4a:88:93:6a:6c:49 | e2:17:30:48:88:c9 | ARP | 42 | Who has 10.7.0.32? Tell 154.61.71.13 |
2 | 0.000235 | e2:17:30:48:88:c9 | 4a:88:93:6a:6c:49 | ARP | 60 | 10.7.0.32 is at e2:17:30:48:88:c9 |
3 | 38.144007 | 4a:88:93:6a:6c:49 | e2:17:30:48:88:c9 | ARP | 42 | Who has 10.7.0.32? Tell 154.61.71.13 |
4 | 38.144247 | e2:17:30:48:88:c9 | 4a:88:93:6a:6c:49 | ARP | 60 | 10.7.0.32 is at e2:17:30:48:88:c9 |
5 | 43.591006 | e2:17:30:48:88:c9 | 32:e2:17:db:d2:77 | ARP | 60 | Who has 10.7.0.1? Tell 10.7.0.32 |
6 | 44.585744 | e2:17:30:48:88:c9 | 32:e2:17:db:d2:77 | ARP | 60 | Who has 10.7.0.1? Tell 10.7.0.32 |
7 | 45.226516 | 10.7.0.32 | 224.0.0.22 | IGMPv3 | 60 | Membership Report / Join group 239.255.255.250 for any sources |
8 | 45.23221 | 10.7.0.32 | 239.255.255.250 | SSDP | 175 | M-SEARCH * HTTP/1.1 |
9 | 45.579151 | 10.7.0.32 | 239.255.255.250 | SSDP | 175 | M-SEARCH * HTTP/1.1 |
10 | 45.584081 | e2:17:30:48:88:c9 | 32:e2:17:db:d2:77 | ARP | 60 | Who has 10.7.0.1? Tell 10.7.0.32 |
11 | 45.584167 | 10.7.0.32 | 224.0.0.22 | IGMPv3 | 60 | Membership Report / Join group 239.255.255.250 for any sources |
12 | 48.00215 | e2:17:30:48:88:c9 | Broadcast | ARP | 60 | Who has 10.7.0.1? Tell 10.7.0.32 |
13 | 48.002165 | 4a:88:93:6a:6c:49 | e2:17:30:48:88:c9 | ARP | 42 | 10.7.0.1 is at 4a:88:93:6a:6c:49 |
14 | 48.238665 | 10.7.0.32 | 239.255.255.250 | SSDP | 175 | M-SEARCH * HTTP/1.1 |
15 | 48.571827 | 10.7.0.32 | 239.255.255.250 | SSDP | 175 | M-SEARCH * HTTP/1.1 |
16 | 51.244129 | 10.7.0.32 | 239.255.255.250 | SSDP | 175 | M-SEARCH * HTTP/1.1 |
17 | 52.406554 | 10.7.0.32 | 224.0.0.252 | LLMNR | 64 | Standard query 0x614a A wpad |
18 | 52.507687 | 10.7.0.32 | 224.0.0.252 | LLMNR | 64 | Standard query 0x614a A wpad |
19 | 52.712579 | 10.7.0.32 | 10.7.0.255 | NBNS | 92 | Name query NB WPAD<00> |
20 | 53.474799 | 10.7.0.32 | 10.7.0.255 | NBNS | 92 | Name query NB WPAD<00> |
21 | 54.239125 | 10.7.0.32 | 10.7.0.255 | NBNS | 92 | Name query NB WPAD<00> |
22 | 55.697063 | 10.7.0.32 | 213.227.154.92 | TCP | 66 | 57719 > 443 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=256 SACK_PERM |
23 | 55.698739 | 213.227.154.92 | 10.7.0.32 | TCP | 66 | 443 > 57719 [SYN, ACK] Seq=0 Ack=1 Win=64240 Len=0 MSS=1460 SACK_PERM WS=128 |
24 | 55.698909 | 10.7.0.32 | 213.227.154.92 | TCP | 60 | 57719 > 443 [ACK] Seq=1 Ack=1 Win=65536 Len=0 |
25 | 55.813326 | 10.7.0.32 | 213.227.154.92 | TLSv1.2 | 196 | Client Hello |
26 | 55.815191 | 213.227.154.92 | 10.7.0.32 | TCP | 54 | 443 > 57719 [ACK] Seq=1 Ack=143 Win=64128 Len=0 |
27 | 55.816232 | 213.227.154.92 | 10.7.0.32 | TLSv1.2 | 140 | Server Hello |
28 | 56.017525 | 10.7.0.32 | 213.227.154.92 | TCP | 60 | 57719 > 443 [ACK] Seq=143 Ack=87 Win=65536 Len=0 |
29 | 56.019186 | 213.227.154.92 | 10.7.0.32 | TLSv1.2 | 1,406 | Certificate, Server Hello Done |
30 | 56.025032 | 10.7.0.32 | 213.227.154.92 | TLSv1.2 | 412 | Client Key Exchange, Change Cipher Spec, Encrypted Handshake Message |
31 | 56.02668 | 213.227.154.92 | 10.7.0.32 | TCP | 54 | 443 > 57719 [ACK] Seq=1439 Ack=501 Win=64128 Len=0 |
32 | 56.029944 | 213.227.154.92 | 10.7.0.32 | TLSv1.2 | 60 | Change Cipher Spec |
33 | 56.233007 | 10.7.0.32 | 213.227.154.92 | TCP | 60 | 57719 > 443 [ACK] Seq=501 Ack=1445 Win=64256 Len=0 |
34 | 56.234625 | 213.227.154.92 | 10.7.0.32 | TLSv1.2 | 139 | Encrypted Handshake Message |
35 | 56.451343 | 10.7.0.32 | 213.227.154.92 | TCP | 60 | 57719 > 443 [ACK] Seq=501 Ack=1530 Win=65536 Len=0 |
36 | 56.585307 | 10.7.0.32 | 8.8.8.8 | DNS | 74 | Standard query 0x702e A r3.i.lencr.org |
37 | 56.601028 | 8.8.8.8 | 10.7.0.32 | DNS | 179 | Standard query response 0x702e A r3.i.lencr.org CNAME crl.root-x1.letsencrypt.org.edgekey.net CNAME e8652.dscx.akamaiedge.net A 104.73.131.204 |
38 | 56.60444 | 10.7.0.32 | 104.73.131.204 | TCP | 66 | 57720 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=256 SACK_PERM |
39 | 56.605372 | 104.73.131.204 | 10.7.0.32 | TCP | 66 | 80 > 57720 [SYN, ACK] Seq=0 Ack=1 Win=64240 Len=0 MSS=1460 SACK_PERM WS=128 |
40 | 56.60559 | 10.7.0.32 | 104.73.131.204 | TCP | 60 | 57720 > 80 [ACK] Seq=1 Ack=1 Win=65536 Len=0 |
41 | 56.605865 | 10.7.0.32 | 104.73.131.204 | HTTP | 168 | GET / HTTP/1.1 |
42 | 56.60678 | 104.73.131.204 | 10.7.0.32 | TCP | 54 | 80 > 57720 [ACK] Seq=1 Ack=115 Win=64128 Len=0 |
43 | 56.61066 | 104.73.131.204 | 10.7.0.32 | TCP | 1,514 | 80 > 57720 [ACK] Seq=1 Ack=115 Win=64128 Len=1460 [TCP PDU reassembled in 44] |
44 | 56.610666 | 104.73.131.204 | 10.7.0.32 | HTTP | 191 | HTTP/1.1 200 OK (application/pkix-cert) |
45 | 56.610892 | 10.7.0.32 | 104.73.131.204 | TCP | 60 | 57720 > 80 [ACK] Seq=115 Ack=1598 Win=65536 Len=0 |
46 | 56.646368 | 10.7.0.32 | 8.8.8.8 | DNS | 74 | Standard query 0xb192 A x1.i.lencr.org |
47 | 56.662726 | 8.8.8.8 | 10.7.0.32 | DNS | 179 | Standard query response 0xb192 A x1.i.lencr.org CNAME crl.root-x1.letsencrypt.org.edgekey.net CNAME e8652.dscx.akamaiedge.net A 104.73.131.204 |
48 | 56.663883 | 10.7.0.32 | 104.73.131.204 | TCP | 66 | 57721 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=256 SACK_PERM |
49 | 56.66481 | 104.73.131.204 | 10.7.0.32 | TCP | 66 | 80 > 57721 [SYN, ACK] Seq=0 Ack=1 Win=64240 Len=0 MSS=1460 SACK_PERM WS=128 |
50 | 56.664934 | 10.7.0.32 | 104.73.131.204 | TCP | 60 | 57721 > 80 [ACK] Seq=1 Ack=1 Win=65536 Len=0 |
51 | 56.665332 | 10.7.0.32 | 104.73.131.204 | HTTP | 168 | GET / HTTP/1.1 |
52 | 56.666241 | 104.73.131.204 | 10.7.0.32 | TCP | 54 | 80 > 57721 [ACK] Seq=1 Ack=115 Win=64128 Len=0 |
53 | 56.669586 | 104.73.131.204 | 10.7.0.32 | TCP | 1,514 | 80 > 57721 [ACK] Seq=1 Ack=115 Win=64128 Len=1460 [TCP PDU reassembled in 54] |
54 | 56.66959 | 104.73.131.204 | 10.7.0.32 | HTTP | 277 | HTTP/1.1 200 OK (application/pkix-cert) |
55 | 56.669846 | 10.7.0.32 | 104.73.131.204 | TCP | 60 | 57721 > 80 [ACK] Seq=115 Ack=1684 Win=65536 Len=0 |
56 | 56.785628 | 10.7.0.32 | 8.8.8.8 | DNS | 90 | Standard query 0xb888 A www.download.windowsupdate.com |
57 | 56.790826 | 8.8.8.8 | 10.7.0.32 | DNS | 294 | Standard query response 0xb888 A www.download.windowsupdate.com CNAME wu-shim.trafficmanager.net CNAME download.windowsupdate.com.edgesuite.net CNAME a767.dspw65.akamai.net A 2.22.144.123 A 2.22.144.129 A 2.22.144.120 A 2.22.144.122 A 2.22.144.114 |
58 | 56.792164 | 10.7.0.32 | 2.22.144.123 | TCP | 66 | 57722 > 80 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=256 SACK_PERM |
59 | 56.800075 | 2.22.144.123 | 10.7.0.32 | TCP | 66 | 80 > 57722 [SYN, ACK] Seq=0 Ack=1 Win=29200 Len=0 MSS=1460 SACK_PERM WS=128 |
60 | 56.800209 | 10.7.0.32 | 2.22.144.123 | TCP | 60 | 57722 > 80 [ACK] Seq=1 Ack=1 Win=65536 Len=0 |
61 | 56.800381 | 10.7.0.32 | 2.22.144.123 | HTTP | 353 | GET /msdownload/update/v3/static/trustedr/en/authrootstl.cab HTTP/1.1 |
62 | 56.808244 | 2.22.144.123 | 10.7.0.32 | TCP | 54 | 80 > 57722 [ACK] Seq=1 Ack=300 Win=30336 Len=0 |
63 | 56.810567 | 2.22.144.123 | 10.7.0.32 | TCP | 1,514 | 80 > 57722 [ACK] Seq=1 Ack=300 Win=30336 Len=1460 [TCP PDU reassembled in 109] |
64 | 56.810569 | 2.22.144.123 | 10.7.0.32 | TCP | 1,514 | 80 > 57722 [ACK] Seq=1461 Ack=300 Win=30336 Len=1460 [TCP PDU reassembled in 109] |
65 | 56.810571 | 2.22.144.123 | 10.7.0.32 | TCP | 1,514 | 80 > 57722 [ACK] Seq=2921 Ack=300 Win=30336 Len=1460 [TCP PDU reassembled in 109] |
66 | 56.810572 | 2.22.144.123 | 10.7.0.32 | TCP | 1,514 | 80 > 57722 [ACK] Seq=4381 Ack=300 Win=30336 Len=1460 [TCP PDU reassembled in 109] |
67 | 56.810574 | 2.22.144.123 | 10.7.0.32 | TCP | 1,514 | 80 > 57722 [ACK] Seq=5841 Ack=300 Win=30336 Len=1460 [TCP PDU reassembled in 109] |
68 | 56.810625 | 2.22.144.123 | 10.7.0.32 | TCP | 1,514 | 80 > 57722 [ACK] Seq=7301 Ack=300 Win=30336 Len=1460 [TCP PDU reassembled in 109] |
69 | 56.810627 | 2.22.144.123 | 10.7.0.32 | TCP | 1,514 | 80 > 57722 [ACK] Seq=8761 Ack=300 Win=30336 Len=1460 [TCP PDU reassembled in 109] |
70 | 56.810628 | 2.22.144.123 | 10.7.0.32 | TCP | 1,514 | 80 > 57722 [ACK] Seq=10221 Ack=300 Win=30336 Len=1460 [TCP PDU reassembled in 109] |
71 | 56.810629 | 2.22.144.123 | 10.7.0.32 | TCP | 1,514 | 80 > 57722 [ACK] Seq=11681 Ack=300 Win=30336 Len=1460 [TCP PDU reassembled in 109] |
72 | 56.810631 | 2.22.144.123 | 10.7.0.32 | TCP | 1,514 | 80 > 57722 [ACK] Seq=13141 Ack=300 Win=30336 Len=1460 [TCP PDU reassembled in 109] |
73 | 56.810684 | 2.22.144.123 | 10.7.0.32 | TCP | 1,514 | 80 > 57722 [ACK] Seq=14601 Ack=300 Win=30336 Len=1460 [TCP PDU reassembled in 109] |
74 | 56.810687 | 2.22.144.123 | 10.7.0.32 | TCP | 1,514 | 80 > 57722 [ACK] Seq=16061 Ack=300 Win=30336 Len=1460 [TCP PDU reassembled in 109] |
75 | 56.810688 | 2.22.144.123 | 10.7.0.32 | TCP | 1,514 | 80 > 57722 [ACK] Seq=17521 Ack=300 Win=30336 Len=1460 [TCP PDU reassembled in 109] |
76 | 56.81069 | 2.22.144.123 | 10.7.0.32 | TCP | 1,514 | 80 > 57722 [ACK] Seq=18981 Ack=300 Win=30336 Len=1460 [TCP PDU reassembled in 109] |
77 | 56.810691 | 2.22.144.123 | 10.7.0.32 | TCP | 1,514 | 80 > 57722 [ACK] Seq=20441 Ack=300 Win=30336 Len=1460 [TCP PDU reassembled in 109] |
78 | 56.81071 | 2.22.144.123 | 10.7.0.32 | TCP | 1,514 | 80 > 57722 [ACK] Seq=21901 Ack=300 Win=30336 Len=1460 [TCP PDU reassembled in 109] |
79 | 56.810849 | 10.7.0.32 | 2.22.144.123 | TCP | 60 | 57722 > 80 [ACK] Seq=300 Ack=2921 Win=65536 Len=0 |
80 | 56.811006 | 10.7.0.32 | 2.22.144.123 | TCP | 60 | 57722 > 80 [ACK] Seq=300 Ack=5841 Win=65536 Len=0 |
81 | 56.811135 | 10.7.0.32 | 2.22.144.123 | TCP | 60 | 57722 > 80 [ACK] Seq=300 Ack=8761 Win=65536 Len=0 |
82 | 56.811274 | 10.7.0.32 | 2.22.144.123 | TCP | 60 | 57722 > 80 [ACK] Seq=300 Ack=11681 Win=65536 Len=0 |
83 | 56.811572 | 2.22.144.123 | 10.7.0.32 | TCP | 1,514 | 80 > 57722 [ACK] Seq=23361 Ack=300 Win=30336 Len=1460 [TCP PDU reassembled in 109] |
84 | 56.811575 | 2.22.144.123 | 10.7.0.32 | TCP | 1,514 | 80 > 57722 [ACK] Seq=24821 Ack=300 Win=30336 Len=1460 [TCP PDU reassembled in 109] |
85 | 56.811576 | 2.22.144.123 | 10.7.0.32 | TCP | 1,514 | 80 > 57722 [ACK] Seq=26281 Ack=300 Win=30336 Len=1460 [TCP PDU reassembled in 109] |
86 | 56.811577 | 2.22.144.123 | 10.7.0.32 | TCP | 1,514 | 80 > 57722 [ACK] Seq=27741 Ack=300 Win=30336 Len=1460 [TCP PDU reassembled in 109] |
87 | 56.811579 | 2.22.144.123 | 10.7.0.32 | TCP | 1,514 | 80 > 57722 [ACK] Seq=29201 Ack=300 Win=30336 Len=1460 [TCP PDU reassembled in 109] |
88 | 56.811633 | 2.22.144.123 | 10.7.0.32 | TCP | 1,514 | 80 > 57722 [ACK] Seq=30661 Ack=300 Win=30336 Len=1460 [TCP PDU reassembled in 109] |
89 | 56.811637 | 2.22.144.123 | 10.7.0.32 | TCP | 1,514 | 80 > 57722 [ACK] Seq=32121 Ack=300 Win=30336 Len=1460 [TCP PDU reassembled in 109] |
90 | 56.811639 | 2.22.144.123 | 10.7.0.32 | TCP | 1,514 | 80 > 57722 [ACK] Seq=33581 Ack=300 Win=30336 Len=1460 [TCP PDU reassembled in 109] |
91 | 56.81164 | 2.22.144.123 | 10.7.0.32 | TCP | 1,514 | 80 > 57722 [ACK] Seq=35041 Ack=300 Win=30336 Len=1460 [TCP PDU reassembled in 109] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.