Академический Документы
Профессиональный Документы
Культура Документы
Web Usage............................................................................................................................................................... 4
Top Allowed Websites...................................................................................................................................................... 4
Top Websites by Bandwidth............................................................................................................................................. 4
Top Blocked Websites...................................................................................................................................................... 4
Top Users by Blocked Requests....................................................................................................................................... 5
Top Users by Requests.................................................................................................................................................... 5
Top Users by Bandwidth................................................................................................................................................... 5
Top Video Streaming Web Sites by Bandwidth................................................................................................................ 6
Emails....................................................................................................................................................................... 7
Top Senders by Number of Emails................................................................................................................................... 7
Top Senders by Combined Email Size............................................................................................................................. 7
Top Recipients by Number of Emails................................................................................................................................ 7
Top Recipients by Combined Email Size.......................................................................................................................... 7
Threats...................................................................................................................................................................... 8
Malware Detected............................................................................................................................................................. 8
Malware Victims................................................................................................................................................................ 8
Malware Sources.............................................................................................................................................................. 8
Malware History................................................................................................................................................................ 8
Botnet Detected................................................................................................................................................................ 8
Botnet Victims................................................................................................................................................................... 8
Botnet C&C....................................................................................................................................................................... 9
Botnet History................................................................................................................................................................... 9
Intrusions Detected........................................................................................................................................................... 9
Intrusion Victims................................................................................................................................................................ 9
Intrusion Sources.............................................................................................................................................................. 11
Intrusions Blocked............................................................................................................................................................. 13
Intrusions By Severity....................................................................................................................................................... 14
Intrusion History................................................................................................................................................................ 14
0K
20K
40K
60K
80K
100K
120K
140K
160K
180K
200K
23
0K
600K
1200K
1800K
2400K
3000K
3600K
4200K
4800K
5400K
6000K
Bandwidth
:0 23
0 :0
0
00
:0 00
0 :0
0
Number of Sessions
01
:0 01
0 :0
0
02 02
:0
0 :0
0
03 03
:0
0 :0
0
04 04
:0
0 :0
0
05 05
:0
Bandwidth and Applications
0 :0
0
0 0
21 21
:0 :0
0 0
22 22
Traffic In
:0 :0
0 0
Page 1 of 16
Traffic Statistics
Summary Stats
Total Sessions 1.4 M
Total Bytes In: 13.0 GB Out: 3.1 GB
Average Sessions Per Hour 58.4 K
Average Bytes Per Hour In: 553.8 MB Out: 130.5 MB
Most Active Hour By Sessions 2018-07-16 11:00
Total Users 7.9 K
Total Applications 5.0 K
Total Destinations 5.9 K
720
640
560
Active Users
480
400
320
240
160
80
0
0
0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
23
00
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
Top Destinations by Bandwidth
Hostname (or IP) Traffic Out Traffic In Sessions
161.202.13.194 2.3 GB 1.2 K
138.201.124.91 1.5 GB 9
144.76.12.115 1.2 GB 5
74.125.68.109 619.6 MB 24
23.57.202.204 529.8 MB 4.1 K
172.217.194.108 520.7 MB 33
8.253.181.235 304.2 MB 2
23.206.202.197 274.5 MB 561
64.185.181.238 270.4 MB 2.1 K
17.253.83.203 265.0 MB 1
Malware Victims
# Victim Occurrence
No matching log data for this report
Malware Sources
# Malware Source Host Name Counts
No matching log data for this report
Malware History
10
6
# of Viruses
0
0
0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
23
00
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
Botnet Detected 22
Botnet Victims
# Victim Name Counts
No matching log data for this report
Botnet History
10
6
# of Botnet
0
0
0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
23
00
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
Intrusions Detected
# Intrusion Name Counts
1 TCP.Overlapping.Fragments 670
2 Traceroute 340
3 Netcore.Netis.Devices.Hardcoded.Password.Security.Bypa 56
4 TCP.Out.Of.Range.Timestamp 4
5 Zivif.PR115-204-P-RS.Web.Cameras.Hardcoded.Password 4
6 Avahi.NULL.UDP.Packet.DoS 2
7 HTTP.Null.Session 2
8 PHP.memory.limit.Code.Execution 1
9 TCP.Bad.Option.Length 1
10 TCP.Stealth.Activity 1
Intrusion Victims
# Intrusion Victim Counts
1 150.70.178.32 288
2 45.113.192.101 86
3 115.113.196.180 66
4 172.217.166.99 30
5 104.244.42.129 29
6 172.217.160.132 29
7 172.217.26.164 29
Intrusion Sources
# Intrusion Source Counts
1 131.107.1.13 318
2 192.168.5.14 78
3 192.168.5.17 56
4 192.168.5.11 45
5 192.168.5.35 36
6 131.107.1.78 35
7 192.168.5.12 35
Intrusions Blocked
# Intrusion Name Counts
1 TCP.Overlapping.Fragments 670
2 Traceroute 340
3 Netcore.Netis.Devices.Hardcoded.Password.Security.Bypa 56
4 TCP.Out.Of.Range.Timestamp 4
5 Zivif.PR115-204-P-RS.Web.Cameras.Hardcoded.Password 4
6 Avahi.NULL.UDP.Packet.DoS 2
7 HTTP.Null.Session 2
Intrusions By Severity
% Severity Occurrence
94.3% low 1.0 K
5.6% critical 60
0.2% medium 2
Intrusion History
200
180
160
140
# of Intrusions
120
100
80
60
40
20
0
0
0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
23
00
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
System Events
# Event Name (Description) Severity Counts
1 Configuration changed 2
4 Disk full 5