Beruflich Dokumente
Kultur Dokumente
Web Usage............................................................................................................................................................... 4
Top Allowed Websites...................................................................................................................................................... 4
Top Websites by Bandwidth............................................................................................................................................. 4
Top Blocked Websites...................................................................................................................................................... 4
Top Users by Blocked Requests....................................................................................................................................... 4
Top Users by Requests.................................................................................................................................................... 4
Top Users by Bandwidth................................................................................................................................................... 4
Top Video Streaming Web Sites by Bandwidth................................................................................................................ 4
Emails....................................................................................................................................................................... 5
Top Senders by Number of Emails................................................................................................................................... 5
Top Senders by Combined Email Size............................................................................................................................. 5
Top Recipients by Number of Emails................................................................................................................................ 5
Top Recipients by Combined Email Size.......................................................................................................................... 5
Threats...................................................................................................................................................................... 6
Malware Detected............................................................................................................................................................. 6
Malware Victims................................................................................................................................................................ 6
Malware Sources.............................................................................................................................................................. 6
Malware History................................................................................................................................................................ 6
Botnet Detected................................................................................................................................................................ 6
Botnet Victims................................................................................................................................................................... 6
Botnet C&C....................................................................................................................................................................... 7
Botnet History................................................................................................................................................................... 7
Intrusions Detected........................................................................................................................................................... 7
Intrusion Victims................................................................................................................................................................ 7
Intrusion Sources.............................................................................................................................................................. 8
Intrusions Blocked............................................................................................................................................................. 9
Intrusions By Severity....................................................................................................................................................... 9
Intrusion History................................................................................................................................................................ 9
0
500
1000
1500
2000
2500
3000
3500
4000
4500
5000
00
0K
200K
400K
600K
800K
1000K
1200K
1400K
1600K
1800K
2000K
Bandwidth
:0 00
0 :0
0
01
:0 01
0 :0
0
Number of Sessions
02
:0 02
0 :0
0
03
:0 03
0 :0
0
04
:0 04
0 :0
0
05
:0 05
0 :0
0
06 06
:0
0
Bandwidth and Applications
:0
0
07
0 0
22 22
:0 :0
0 0
23 23
Traffic In
:0 :0
0 0
Page 1 of 11
Traffic Statistics
Summary Stats
Total Sessions 80.1 K
Total Bytes In: 1.9 GB Out: 258.5 MB
Average Sessions Per Hour 3.3 K
Average Bytes Per Hour In: 80.3 MB Out: 10.8 MB
Most Active Hour By Sessions 2020-06-20 12:00
Total Users 74
Total Applications 73
Total Destinations 376
45
40
35
Active Users
30
25
20
15
10
0
0
0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
00
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
23
Top Destinations by Bandwidth
Hostname (or IP) Traffic Out Traffic In Sessions
2.tlu.dl.delivery.mp.microsoft. 637.4 MB 650
11.tlu.dl.delivery.mp.microsoft 304.2 MB 128
officecdn.microsoft.com.edgesui 255.4 MB 88
apple.com 137.1 MB 974
microsoft.com 125.0 MB 4.3 K
veritas.com 105.7 MB 1.4 K
eset.com 98.6 MB 30.7 K
sharepoint.com 70.5 MB 86
2mdn.net 66.8 MB 17
anynet relay 63.8 MB 0
Malware Victims
# Victim Occurrence
No matching log data for this report
Malware Sources
# Malware Source Host Name Counts
No matching log data for this report
Malware History
10
6
# of Viruses
0
0
0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
00
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
Botnet Detected 23
Botnet Victims
# Victim Name Counts
No matching log data for this report
Botnet History
10
6
# of Botnet
0
0
0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
00
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
23
Intrusions Detected
# Intrusion Name Counts
1 Backdoor.DoublePulsar 272
2 MS.SMB.Server.Trans.Peeking.Data.Information.Disclosur 16
3 MS.SMB.Server.SMB1.Trans2.Secondary.Handling.Code.E 8
4 PHPUnit.Eval-stdin.PHP.Remote.Code.Execution 5
5 TCP.Split.Handshake 5
6 ThinkPHP.Controller.Parameter.Remote.Code.Execution 5
7 HTTP.Unix.Shell.IFS.Remote.Code.Execution 2
8 Netcore.Netis.Devices.Hardcoded.Password.Security.Bypa 2
9 Netlink.GPON.Router.formPing.Remote.Command.Injectio 2
10 D-Link.Devices.HNAP.SOAPAction-Header.Command.Exe 1
11 JAWS.DVR.CCTV.Shell.Unauthenticated.Command.Execut 1
12 NETGEAR.DGN1000.CGI.Unauthenticated.Remote.Code. 1
Intrusion Victims
# Intrusion Victim Counts
1 186.116.7.62 305
2 186.116.7.58 7
3 191.75.176.165 4
4 186.116.7.61 3
5 190.67.249.2 1
Intrusions By Severity
% Severity Occurrence
91.9% critical 294
6.6% medium 21
1.6% high 5
Intrusion History
40
36
32
28
# of Intrusions
24
20
16
12
0
0
0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
:0
00
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
23
System Events
# Event Name (Description) Severity Counts
1 Disk log file deleted 4