No.
int64 1
117k
| Time
float64 0
6.94k
| Source
stringclasses 322
values | Destination
stringclasses 539
values | Protocol
stringclasses 59
values | Length
int64 42
6.05k
| Info
stringlengths 1
654
|
---|---|---|---|---|---|---|
4,368 | 206.307082 | 10.0.2.15 | 10.0.2.2 | TCP | 66 | 45178 > 22 [ACK] Seq=1 Ack=39 Win=64256 Len=0 TSval=1570548493 TSecr=419832 |
4,369 | 206.308057 | 10.0.2.15 | 10.0.2.2 | TCP | 66 | 36192 > 8180 [ACK] Seq=217 Ack=5793 Win=61184 Len=0 TSval=1570548494 TSecr=419832 |
4,370 | 206.309033 | 10.0.2.2 | 10.0.2.15 | FTP | 324 | Response: |
4,371 | 206.31001 | 10.0.2.15 | 10.0.2.2 | TCP | 66 | 36192 > 8180 [ACK] Seq=217 Ack=7241 Win=60160 Len=0 TSval=1570548494 TSecr=419832 |
4,372 | 206.310983 | 10.0.2.15 | 10.0.2.2 | TCP | 66 | 36192 > 8180 [ACK] Seq=217 Ack=8689 Win=59008 Len=0 TSval=1570548498 TSecr=419833 |
4,373 | 206.311959 | 10.0.2.15 | 10.0.2.2 | TCP | 66 | 55032 > 21 [ACK] Seq=49 Ack=444 Win=64128 Len=0 TSval=1570548502 TSecr=419833 |
4,374 | 206.332454 | 10.0.2.15 | 10.0.2.2 | TCP | 66 | 55024 > 21 [ACK] Seq=49 Ack=202 Win=64256 Len=0 TSval=1570548523 TSecr=419831 |
4,375 | 206.33343 | 10.0.2.15 | 10.0.2.2 | TCP | 66 | 55024 > 21 [RST, ACK] Seq=49 Ack=202 Win=64256 Len=0 TSval=1570548523 TSecr=419831 |
4,376 | 206.33343 | 10.0.2.15 | 10.0.2.2 | TCP | 66 | 60676 > 80 [FIN, ACK] Seq=209 Ack=1088 Win=64128 Len=0 TSval=1570548523 TSecr=419827 |
4,377 | 206.334407 | 10.0.2.15 | 10.0.2.2 | TCP | 74 | 60682 > 80 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 SACK_PERM TSval=1570548523 TSecr=0 WS=128 |
4,378 | 206.335383 | 10.0.2.15 | 10.0.2.2 | TCP | 66 | 43902 > 36372 [FIN, ACK] Seq=1 Ack=2 Win=64256 Len=0 TSval=1570548524 TSecr=419822 |
4,379 | 206.336359 | 10.0.2.15 | 10.0.2.2 | SMB | 109 | Logoff AndX Request |
4,380 | 206.336359 | 10.0.2.2 | 10.0.2.15 | TCP | 66 | 80 > 60676 [ACK] Seq=1088 Ack=210 Win=6912 Len=0 TSval=419836 TSecr=1570548523 |
4,381 | 206.33737 | 10.0.2.2 | 10.0.2.15 | TCP | 74 | 80 > 60682 [SYN, ACK] Seq=0 Ack=1 Win=5792 Len=0 MSS=1460 SACK_PERM TSval=419837 TSecr=1570548523 WS=64 |
4,382 | 206.338311 | 10.0.2.2 | 10.0.2.15 | TCP | 66 | 36372 > 43902 [ACK] Seq=2 Ack=2 Win=5824 Len=0 TSval=419837 TSecr=1570548524 |
4,383 | 206.339287 | 10.0.2.2 | 10.0.2.15 | SMB | 109 | Logoff AndX Response |
4,384 | 206.340263 | 10.0.2.15 | 10.0.2.2 | TCP | 66 | 60682 > 80 [ACK] Seq=1 Ack=1 Win=64256 Len=0 TSval=1570548531 TSecr=419837 |
4,385 | 206.341239 | 10.0.2.15 | 10.0.2.2 | TCP | 66 | 36924 > 445 [ACK] Seq=426 Ack=605 Win=64128 Len=0 TSval=1570548532 TSecr=419837 |
4,386 | 206.351975 | 10.0.2.15 | 10.0.2.2 | TCP | 66 | 36192 > 8180 [ACK] Seq=217 Ack=8840 Win=64128 Len=0 TSval=1570548542 TSecr=419833 |
4,387 | 206.384184 | 10.0.2.15 | 10.0.2.2 | TCP | 66 | 36188 > 8180 [FIN, ACK] Seq=152 Ack=8840 Win=64128 Len=0 TSval=1570548574 TSecr=419827 |
4,388 | 206.386178 | 10.0.2.15 | 10.0.2.2 | TCP | 74 | 36198 > 8180 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 SACK_PERM TSval=1570548574 TSecr=0 WS=128 |
4,389 | 206.386178 | 10.0.2.15 | 10.0.2.2 | SSHv2 | 93 | Client: Protocol (SSH-2.0-Nmap-SSH2-Hostkey) |
4,390 | 206.387111 | 10.0.2.15 | 10.0.2.2 | FTP | 72 | Request: QUIT |
4,391 | 206.388087 | 10.0.2.15 | 10.0.2.2 | HTTP | 273 | OPTIONS / HTTP/1.1 |
4,392 | 206.389063 | 10.0.2.15 | 10.0.2.2 | SMB | 215 | Session Setup AndX Request, NTLMSSP_NEGOTIATE |
4,393 | 206.390039 | 10.0.2.2 | 10.0.2.15 | TCP | 66 | 8180 > 36188 [ACK] Seq=8840 Ack=153 Win=6912 Len=0 TSval=419842 TSecr=1570548574 |
4,394 | 206.390039 | 10.0.2.2 | 10.0.2.15 | TCP | 74 | 8180 > 36198 [SYN, ACK] Seq=0 Ack=1 Win=5792 Len=0 MSS=1460 SACK_PERM TSval=419842 TSecr=1570548574 WS=64 |
4,395 | 206.391015 | 10.0.2.2 | 10.0.2.15 | TCP | 66 | 22 > 45178 [ACK] Seq=39 Ack=28 Win=5824 Len=0 TSval=419842 TSecr=1570548575 |
4,396 | 206.392968 | 10.0.2.2 | 10.0.2.15 | SSHv2 | 850 | Server: Key Exchange Init |
4,397 | 206.393946 | 10.0.2.2 | 10.0.2.15 | FTP | 80 | Response: 221 Goodbye. |
4,398 | 206.394919 | 10.0.2.15 | 10.0.2.2 | TCP | 66 | 36198 > 8180 [ACK] Seq=1 Ack=1 Win=64256 Len=0 TSval=1570548584 TSecr=419842 |
4,399 | 206.394919 | 10.0.2.2 | 10.0.2.15 | TCP | 66 | 21 > 55032 [FIN, ACK] Seq=458 Ack=55 Win=5824 Len=0 TSval=419842 TSecr=1570548575 |
4,400 | 206.395897 | 10.0.2.2 | 10.0.2.15 | TCP | 66 | 80 > 60682 [ACK] Seq=1 Ack=208 Win=6912 Len=0 TSval=419842 TSecr=1570548575 |
4,401 | 206.396917 | 10.0.2.15 | 10.0.2.2 | TCP | 66 | 45178 > 22 [ACK] Seq=28 Ack=823 Win=64128 Len=0 TSval=1570548585 TSecr=419842 |
4,402 | 206.397847 | 10.0.2.15 | 10.0.2.2 | TCP | 66 | 55032 > 21 [ACK] Seq=55 Ack=458 Win=64128 Len=0 TSval=1570548586 TSecr=419842 |
4,403 | 206.401784 | 10.0.2.2 | 10.0.2.15 | SMB | 405 | Session Setup AndX Response, NTLMSSP_CHALLENGE, Error: STATUS_MORE_PROCESSING_REQUIRED |
4,404 | 206.401784 | 10.0.2.2 | 10.0.2.15 | HTTP | 1,152 | HTTP/1.1 200 OK (text/html) |
4,405 | 206.402728 | 10.0.2.2 | 10.0.2.15 | TCP | 66 | 80 > 60682 [FIN, ACK] Seq=1087 Ack=208 Win=6912 Len=0 TSval=419843 TSecr=1570548575 |
4,406 | 206.40468 | 10.0.2.15 | 10.0.2.2 | TCP | 66 | 36936 > 445 [ACK] Seq=203 Ack=471 Win=64128 Len=0 TSval=1570548595 TSecr=419843 |
4,407 | 206.40468 | 10.0.2.15 | 10.0.2.2 | TCP | 66 | 60682 > 80 [ACK] Seq=208 Ack=1087 Win=64128 Len=0 TSval=1570548595 TSecr=419843 |
4,408 | 206.434935 | 10.0.2.15 | 10.0.2.2 | TCP | 66 | 36924 > 445 [FIN, ACK] Seq=426 Ack=605 Win=64128 Len=0 TSval=1570548625 TSecr=419837 |
4,409 | 206.43591 | 10.0.2.15 | 10.0.2.2 | TCP | 66 | 36192 > 8180 [FIN, ACK] Seq=217 Ack=8840 Win=64128 Len=0 TSval=1570548625 TSecr=419833 |
4,410 | 206.436888 | 10.0.2.15 | 10.0.2.2 | TCP | 74 | 36200 > 8180 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 SACK_PERM TSval=1570548625 TSecr=0 WS=128 |
4,411 | 206.436888 | 10.0.2.15 | 10.0.2.2 | TCP | 66 | 55032 > 21 [RST, ACK] Seq=55 Ack=459 Win=64128 Len=0 TSval=1570548625 TSecr=419842 |
4,412 | 206.437862 | 10.0.2.15 | 10.0.2.2 | SSHv2 | 530 | Client: Key Exchange Init |
4,413 | 206.438839 | 10.0.2.15 | 10.0.2.2 | HTTP | 218 | HEAD / HTTP/1.1 |
4,414 | 206.439816 | 10.0.2.2 | 10.0.2.15 | TCP | 66 | 8180 > 36192 [ACK] Seq=8840 Ack=218 Win=6912 Len=0 TSval=419847 TSecr=1570548625 |
4,415 | 206.439816 | 10.0.2.2 | 10.0.2.15 | TCP | 74 | 8180 > 36200 [SYN, ACK] Seq=0 Ack=1 Win=5792 Len=0 MSS=1460 SACK_PERM TSval=419847 TSecr=1570548625 WS=64 |
4,416 | 206.440823 | 10.0.2.2 | 10.0.2.15 | TCP | 66 | 22 > 45178 [FIN, ACK] Seq=823 Ack=492 Win=6912 Len=0 TSval=419847 TSecr=1570548626 |
4,417 | 206.441767 | 10.0.2.2 | 10.0.2.15 | TCP | 66 | 8180 > 36198 [ACK] Seq=1 Ack=153 Win=6912 Len=0 TSval=419847 TSecr=1570548626 |
4,418 | 206.443751 | 10.0.2.15 | 10.0.2.2 | TCP | 66 | 36200 > 8180 [ACK] Seq=1 Ack=1 Win=64256 Len=0 TSval=1570548633 TSecr=419847 |
4,419 | 206.443751 | 10.0.2.2 | 10.0.2.15 | HTTP | 212 | HTTP/1.1 200 OK |
4,420 | 206.444729 | 10.0.2.2 | 10.0.2.15 | TCP | 66 | 8180 > 36198 [FIN, ACK] Seq=147 Ack=153 Win=6912 Len=0 TSval=419847 TSecr=1570548626 |
4,421 | 206.4457 | 10.0.2.15 | 10.0.2.2 | TCP | 66 | 36198 > 8180 [ACK] Seq=153 Ack=147 Win=64128 Len=0 TSval=1570548636 TSecr=419847 |
4,422 | 206.446682 | 10.0.2.2 | 10.0.2.15 | TCP | 66 | 445 > 36924 [FIN, ACK] Seq=605 Ack=427 Win=7936 Len=0 TSval=419848 TSecr=1570548625 |
4,423 | 206.448599 | 10.0.2.15 | 10.0.2.2 | TCP | 66 | 60682 > 80 [ACK] Seq=208 Ack=1088 Win=64128 Len=0 TSval=1570548639 TSecr=419843 |
4,424 | 206.448599 | 10.0.2.15 | 10.0.2.2 | TCP | 66 | 36924 > 445 [ACK] Seq=427 Ack=606 Win=64128 Len=0 TSval=1570548639 TSecr=419848 |
4,425 | 206.48471 | 10.0.2.15 | 10.0.2.2 | TCP | 66 | 45178 > 22 [ACK] Seq=492 Ack=824 Win=64128 Len=0 TSval=1570548675 TSecr=419847 |
4,426 | 206.486681 | 10.0.2.15 | 10.0.2.2 | TCP | 66 | 60682 > 80 [FIN, ACK] Seq=208 Ack=1088 Win=64128 Len=0 TSval=1570548677 TSecr=419843 |
4,427 | 206.487639 | 10.0.2.15 | 10.0.2.2 | TCP | 74 | 60688 > 80 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 SACK_PERM TSval=1570548677 TSecr=0 WS=128 |
4,428 | 206.488616 | 10.0.2.15 | 10.0.2.2 | HTTP | 280 | OPTIONS / HTTP/1.1 |
4,429 | 206.489602 | 10.0.2.15 | 10.0.2.2 | SMB | 246 | Session Setup AndX Request, NTLMSSP_AUTH, User: \\ |
4,430 | 206.490569 | 10.0.2.15 | 10.0.2.2 | TCP | 66 | 36198 > 8180 [ACK] Seq=153 Ack=148 Win=64128 Len=0 TSval=1570548678 TSecr=419847 |
4,431 | 206.490569 | 10.0.2.2 | 10.0.2.15 | TCP | 66 | 80 > 60682 [ACK] Seq=1088 Ack=209 Win=6912 Len=0 TSval=419852 TSecr=1570548677 |
4,432 | 206.491543 | 10.0.2.2 | 10.0.2.15 | TCP | 74 | 80 > 60688 [SYN, ACK] Seq=0 Ack=1 Win=5792 Len=0 MSS=1460 SACK_PERM TSval=419852 TSecr=1570548677 WS=64 |
4,433 | 206.492518 | 10.0.2.2 | 10.0.2.15 | TCP | 66 | 8180 > 36200 [ACK] Seq=1 Ack=215 Win=6912 Len=0 TSval=419852 TSecr=1570548678 |
4,434 | 206.494471 | 10.0.2.2 | 10.0.2.15 | TCP | 1,514 | 8180 > 36200 [ACK] Seq=1 Ack=215 Win=6912 Len=1448 TSval=419852 TSecr=1570548678 [TCP PDU reassembled in 4446] |
4,435 | 206.494471 | 10.0.2.2 | 10.0.2.15 | TCP | 1,514 | 8180 > 36200 [ACK] Seq=1449 Ack=215 Win=6912 Len=1448 TSval=419852 TSecr=1570548678 [TCP PDU reassembled in 4446] |
4,436 | 206.495448 | 10.0.2.2 | 10.0.2.15 | TCP | 1,514 | 8180 > 36200 [ACK] Seq=2897 Ack=215 Win=6912 Len=1448 TSval=419852 TSecr=1570548678 [TCP PDU reassembled in 4446] |
4,437 | 206.496425 | 10.0.2.15 | 10.0.2.2 | TCP | 66 | 60688 > 80 [ACK] Seq=1 Ack=1 Win=64256 Len=0 TSval=1570548685 TSecr=419852 |
4,438 | 206.496425 | 10.0.2.2 | 10.0.2.15 | SMB | 157 | Session Setup AndX Response |
4,439 | 206.499386 | 10.0.2.15 | 10.0.2.2 | TCP | 66 | 36200 > 8180 [ACK] Seq=215 Ack=1449 Win=64128 Len=0 TSval=1570548688 TSecr=419852 |
4,440 | 206.500329 | 10.0.2.15 | 10.0.2.2 | TCP | 66 | 36200 > 8180 [ACK] Seq=215 Ack=2897 Win=63360 Len=0 TSval=1570548689 TSecr=419852 |
4,441 | 206.501303 | 10.0.2.15 | 10.0.2.2 | TCP | 66 | 36200 > 8180 [ACK] Seq=215 Ack=4345 Win=62336 Len=0 TSval=1570548689 TSecr=419852 |
4,442 | 206.502279 | 10.0.2.15 | 10.0.2.2 | TCP | 66 | 36936 > 445 [ACK] Seq=383 Ack=562 Win=64128 Len=0 TSval=1570548691 TSecr=419852 |
4,443 | 206.503254 | 10.0.2.2 | 10.0.2.15 | TCP | 1,514 | 8180 > 36200 [ACK] Seq=4345 Ack=215 Win=6912 Len=1448 TSval=419853 TSecr=1570548688 [TCP PDU reassembled in 4446] |
4,444 | 206.504231 | 10.0.2.2 | 10.0.2.15 | TCP | 1,514 | 8180 > 36200 [ACK] Seq=5793 Ack=215 Win=6912 Len=1448 TSval=419853 TSecr=1570548688 [TCP PDU reassembled in 4446] |
4,445 | 206.504231 | 10.0.2.2 | 10.0.2.15 | TCP | 1,514 | 8180 > 36200 [ACK] Seq=7241 Ack=215 Win=6912 Len=1448 TSval=419853 TSecr=1570548689 [TCP PDU reassembled in 4446] |
4,446 | 206.505206 | 10.0.2.2 | 10.0.2.15 | HTTP | 216 | HTTP/1.1 200 OK (text/html) |
4,447 | 206.507159 | 10.0.2.15 | 10.0.2.2 | TCP | 66 | 36200 > 8180 [ACK] Seq=215 Ack=5793 Win=61184 Len=0 TSval=1570548697 TSecr=419853 |
4,448 | 206.508135 | 10.0.2.15 | 10.0.2.2 | TCP | 66 | 36200 > 8180 [ACK] Seq=215 Ack=7241 Win=60160 Len=0 TSval=1570548698 TSecr=419853 |
4,449 | 206.509113 | 10.0.2.15 | 10.0.2.2 | TCP | 66 | 36200 > 8180 [ACK] Seq=215 Ack=8689 Win=59008 Len=0 TSval=1570548698 TSecr=419853 |
4,450 | 206.5462 | 10.0.2.15 | 10.0.2.2 | TCP | 74 | 45188 > 22 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 SACK_PERM TSval=1570548736 TSecr=0 WS=128 |
4,451 | 206.547175 | 10.0.2.15 | 10.0.2.2 | HTTP | 276 | OPTIONS / HTTP/1.1 |
4,452 | 206.54815 | 10.0.2.2 | 10.0.2.15 | TCP | 74 | 22 > 45188 [SYN, ACK] Seq=0 Ack=1 Win=5792 Len=0 MSS=1460 SACK_PERM TSval=419858 TSecr=1570548736 WS=64 |
4,453 | 206.549126 | 10.0.2.2 | 10.0.2.15 | TCP | 66 | 80 > 60688 [ACK] Seq=1 Ack=211 Win=6912 Len=0 TSval=419858 TSecr=1570548737 |
4,454 | 206.550105 | 10.0.2.15 | 10.0.2.2 | TCP | 66 | 45188 > 22 [ACK] Seq=1 Ack=1 Win=64256 Len=0 TSval=1570548741 TSecr=419858 |
4,455 | 206.552056 | 10.0.2.15 | 10.0.2.2 | TCP | 66 | 36200 > 8180 [ACK] Seq=215 Ack=8840 Win=64128 Len=0 TSval=1570548743 TSecr=419853 |
4,456 | 206.558886 | 10.0.2.2 | 10.0.2.15 | HTTP | 1,152 | HTTP/1.1 200 OK (text/html) |
4,457 | 206.559863 | 10.0.2.2 | 10.0.2.15 | TCP | 66 | 80 > 60688 [FIN, ACK] Seq=1087 Ack=211 Win=6912 Len=0 TSval=419859 TSecr=1570548737 |
4,458 | 206.560839 | 10.0.2.2 | 10.0.2.15 | SSHv2 | 104 | Server: Protocol (SSH-2.0-OpenSSH_4.7p1 Debian-8ubuntu1) |
4,459 | 206.561814 | 10.0.2.15 | 10.0.2.2 | TCP | 66 | 60688 > 80 [ACK] Seq=211 Ack=1087 Win=64128 Len=0 TSval=1570548752 TSecr=419859 |
4,460 | 206.56279 | 10.0.2.15 | 10.0.2.2 | TCP | 66 | 45188 > 22 [ACK] Seq=1 Ack=39 Win=64256 Len=0 TSval=1570548753 TSecr=419859 |
4,461 | 206.603243 | 10.0.2.15 | 10.0.2.2 | TCP | 66 | 36198 > 8180 [FIN, ACK] Seq=153 Ack=148 Win=64128 Len=0 TSval=1570548793 TSecr=419847 |
4,462 | 206.604186 | 10.0.2.15 | 10.0.2.2 | TCP | 74 | 36206 > 8180 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 SACK_PERM TSval=1570548794 TSecr=0 WS=128 |
4,463 | 206.605162 | 10.0.2.15 | 10.0.2.2 | SMB | 135 | Tree Connect AndX Request, Path: \\\\10.0.2.2\\IPC$ |
4,464 | 206.60614 | 10.0.2.15 | 10.0.2.2 | TCP | 66 | 60688 > 80 [ACK] Seq=211 Ack=1088 Win=64128 Len=0 TSval=1570548794 TSecr=419859 |
4,465 | 206.60614 | 10.0.2.2 | 10.0.2.15 | TCP | 66 | 8180 > 36198 [ACK] Seq=148 Ack=154 Win=6912 Len=0 TSval=419863 TSecr=1570548793 |
4,466 | 206.607115 | 10.0.2.2 | 10.0.2.15 | TCP | 74 | 8180 > 36206 [SYN, ACK] Seq=0 Ack=1 Win=5792 Len=0 MSS=1460 SACK_PERM TSval=419864 TSecr=1570548794 WS=64 |
4,467 | 206.60809 | 10.0.2.2 | 10.0.2.15 | SMB | 116 | Tree Connect AndX Response |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.